Tuesday, December 24, 2019

Martin Luther King Jr. s Letter From Birmingham Jail

During the time Martin Luther King Jr. wrote â€Å"Letter from Birmingham Jail† April 16, 1963, while he was in the Birmingham City Jail in Birmingham, Alabama, the world King lived was different form today. A world where blacks and whites where segregated from everything around them. The people of color were treated unequally. The laws during the time was unjustified. The treatment towards the people of color were brutal and very different than the world today. When King wrote the letter, he was in the jail cell because he was arrested for participating in the nonviolent direct-action program march against segregation and he did not have a permit. In Kings letter, he was defending his nonviolent direct-action for segregation to the white clergymen and declaring that the law was unjustified for the people of color. In Kings letter, he uses words and analogies that make him seem like he is talking directly to the white clergy men and that he is talking to them as an equal, respecting the reader and not talking down to them, therefore making his letter seem more positive so the person who received and read his letter seem more interested and opened minded. He starts by explaining that he was not intruding but he was invited to the non-violent march against segregation. King was arrested for being an outsider of the City of Birmingham. He writes to the clergymen saying â€Å"since you have been influenced by the view which argues against â€Å"outsiders coming in†Ã¢â‚¬  (King, 1963). However,Show MoreRelatedMartin Luther King Jr. s Letter From A Birmingham Jail1157 Words   |  5 PagesMartin Luther King Jr.’s â€Å"Letter from a Birmingham Jail† is directed towards the clergymen, although America is his audience, King had come to Birmingham to address the segregation probl em in the United States. He refuses to stay silent, even though people told him to wait for the change to happen. King is a part of the Southern Christian Leadership Conference that has many organizations across the South. He felt that he has a right to be in Birmingham because his organizations have connections withRead MoreMartin Luther King Jr. s Letter From Birmingham Jail934 Words   |  4 PagesIn Martin Luther King Jr.’s , â€Å" Letter from Birmingham Jail†, King responds to the judgments of a group of clergymen , after King s arrest, by writing a letter explaining why the clergymen s judgments were wrong. In his letter, king brings very reasonable and valid points that challenge the judgments of the ministers. The main arguments that king makes would be the reason of his existence in Birmingham, white power structure and its racial injustice, and finally why negotiation has brought up impatienceRead MoreMartin Luther King Jr. s Letter From Birmingham Jail1223 Words   |  5 PagesMartin Luther King, Jr.’s, â€Å"Letter from Birmingham Jail,† emphasizes the need for civil disobedience when faced with unjust laws. This idea contradicts Socrates’ claim made in Crito, that one must follow the law under all circumstances. In this paper, I will argue that Socrates is not a proponent of civil disobedience based on King’s definition of civil disobedience and Socrates’ charges. Moreover, I will argue that both Socrates and King disagree with one another based on the concept of civilRead MoreMartin Luther King Jr s Letter From Birmingham Jail1665 Words   |  7 Pagesbetween these two are most evident in their desire for freedom. Martin Luther King Jr. wanted freedom from segregation and Plato wanted freedom from ignorance. They both wanted justice, and knew that it was immoral to take deny another being justice. For example, Plato has said, â€Å"†¦ Injustice is always an evil and dishonor to him who acts unjustly.† This is similar to what Martin Luther King Jr has also stated in â€Å"Letters from Birmingham Jail†, â€Å"We have a moral responsibility to disobey any law that conflictsRead MoreMartin Luther King Jr.s Letter From Birmingham Jail1726 Words   |  7 PagesOver the course of Letter from Birmingham Jail (1963), the author, Martin Luther King Jr., makes extended allusions to multiple philosophers, among them Aquinas and Socrates. His comparison would seem to indicate that he shares an affinity with them. However, the clarity with which he makes his arguments and the dedication to a single premise strikes most strongly of Kant. Just as Kant’s magnum opus, Critique of Pure Reason, attempted to completely upend a previously accepted mode of thought, soRead MoreMartin Luther King Jr.s Letter From Birmingham Jail890 Words   |  4 PagesFrom 1882-1968, 4,743 lynchings occurred in the United States (NAACP). African Americans accounted for 72.2% of recorded lynchings, yet close to none of these lynchings were ever brought justice. Racial injustice was a huge issue until the mid-l ate twentieth century, and Martin Luther King Jr.’s 1963 â€Å"Letter from Birmingham Jail† was one of the first documents to address the issue. It is one of history’s most important documents regarding racial injustice, as it is considered a classic documentRead MoreMartin Luther King Jr.’S Persuasion in â€Å"Letter from Birmingham Jail†1569 Words   |  7 PagesMartin Luther King Jr.’s Persuasion in â€Å"Letter From Birmingham Jail† After being arrested and imprisoned in Birmingham Jail, Martin Luther King Jr. wrote one of his most famous works to the people of Birmingham, titled â€Å"Letter From Birmingham Jail on April 16, 1963. This piece speaks of the evils of the segregation laws and how the blacks had been treated unfairly in Birmingham, in an attempt to get the white people to support the desegregation of Birmingham. He had been imprisoned because of hisRead MoreMartin Luther King Jr.’s Letter from Birmingham Jail Essay1266 Words   |  6 PagesPower Analysis: Martin Luther King Jr.’s Letter from Birmingham Jail A statement from eight white clergymen from Alabama prompted Martin Luther King’s â€Å"Letter From Birmingham Jail†. This statement criticized Kings actions of non-violent protests against racial segregation and the injustice of unequal civil rights in America (Carpenter elt al.). The eight clergymen considered Birmingham to be â€Å"their† town and King was disrupting the â€Å"Law and Order and Common Sense† established in coping with racialRead MoreAnalysis Of Martin Luther King Jr s Letter From Birmingham Jail986 Words   |  4 Pages and Dr. Martin Luther King Jr’s Letter from Birmingham Jail are two important pieces of history. In Lincoln’s speech he speaks about the dangers of slavery in the United States and warned everybody that people who disrespected American laws could destroy the United States. On the other hand, Martin Luther King Jr. defended the strategy of nonviolent resistance to racism, and argued that people have a mora l responsibility to break unjust laws. Based on these facts, Martin Luther King Jr does notRead MoreAnalysis of Martin Luther King Jr.s Letter from Birmingham Jail962 Words   |  4 Pagesintangible, it is still necessary. Some forms of inspiration come as passionate love while others appeal as injustice. Martin Luther King Jr.s Letter from Birmingham Jail was a response to A Call for Unity by eight white clergymen. His inspiration for writing the letter was the clergymens unjust proposals and the letter allowed him to present his rebuttal. Martin Luther King Jr. effectively crafted his counter argument by first directly addressing his audience, the clergymen, and then using logos

Monday, December 16, 2019

Iron Jawed Angels Toulmin Free Essays

Of the many distinct qualities a person may hold, Leadership has become one of the greatest. A leader is someone recognized because of their undying courage, strength, and passion as well as many other notable qualities. Grounds: A leader is someone who stands out from the crowd and takes charge to accomplish a task or goal. We will write a custom essay sample on Iron Jawed Angels Toulmin or any similar topic only for you Order Now For example, in the movie, Iron Jawed Angels, Alice Paul showed great leadership in her fight for woman’s suffrage. She not only went against the odds but she also took command by starting the WON, separating herself from NASA. Alice Paul showed strength and courage as she picketed in front of the White House as well as starving herself in prison, starting a hunger strike. Another prime example of leadership is Lucy Burns, who was a visionary that took action in fighting for woman’s rights alongside Alice. After being thrown into a woman’s prison, Burns demands the warden respect their rights, only to be cuffed with her arms above her cell door. Alice and Lucy served as examples for the others through their passion and conviction. The rebellious spirit of the two younger activists is in stark contrast to the ore conservative older women. They had no vote, no political clout, no equal rights. But what they lacked under the law they made up for with brains, determination and courage. Warrants: After series of events that pushed the woman suffragists down, they came back harder and stronger with more force and even more determination. Their roles as leaders grew the more they struggled. The woman’s goal to earn their right to vote was a battle that challenged not only their inner capabilities but also the success of the WON. They were brave in spite of danger, they showed wisdom in their political debates, and they gave hope to all women who were treated unequal. Their reputation followed them as their responsibility as leaders and example to others grew. Backing: During the time of war, the women saw it as an opportunity to keep fighting for their rights. They would not let their fight for suffrage fade as did during the Civil War. The women fought Woodrow Wilson to support the suffrage movement as well as fought Congress using the media to gain support. From hanging banners during ingression’s meetings to marching the streets in Washington, Alice and Lucy held their heads high in spite of their oppressors. Their influence grew as their fight for their rights became a national conflict sweeping across America. Emily Leighton became another powerful leader who was heavily influenced by the woman suffragists. From helping fund the WON to walking out on her Democratic husband, Emily became a major figure in the suffragist’s movement as well as an inspiration to all ladies. Suffragists’ movement. Carrie Chapman Cast of the NASA was only a leader by title, to by her actions. She took a more passive approach to fighting for woman’s rights that preferred a state-by-state approach rather than passing a constitutional amendment. Her differences with the younger activists caused conflict with the NP by closing the D. C. Committee along with accusation of using party expenditures. Cast discouraged the younger activists ways of gaining political attention along with their separation of NASA into a new woman’s suffragists party. Her role as a leader was only a reflection of her power in NASA unlike the young activists who fought with earth. Qualifier: Throughout history, leaders emerge when a battle is at hand. No one can proclaim himself or herself a leader. They are born into this world, with a purpose, and a cause. They show great qualities which gives others strength. They influence those around them and give hope when there is none to be found. A leader will march first into battle but will be the last one to leave. Their inspiration and courage motivates others to fight the common cause and to never give up. Alice Paul is one of the many great leaders that will be recognized in history forever. How to cite Iron Jawed Angels Toulmin, Papers

Sunday, December 8, 2019

A Midwifes tale Essay Example For Students

A Midwifes tale Essay : The Life of Martha Ballard Based on Her Diary, 1785-1812 by Laurel Thatcher Ulrich. (New York: Vintage Books, 1990, 444 pp, maps, photos, abbreviations, notes, index.) Laurel Thatcher Ulrich?s portrayal of Martha Ballard?s life shows the intense measures physicians went through to treat their patients and the way of life for these times. Laurel Thatcher Ulrich?s book not only recounts early 1800s medicine but also how the people of their times was perceived. Ulrich discusses how women in this era were viewed as a submissive party that did what the role set by men should be. Ulrich?s book was written from detailed notes taken by midwife Martha Ballard?s diary that fills in the gaps that the assigned history book America a Concise History left.In the book America a Concise History it mentions a brief description of ailments in the community but doesn?t focus on specifics of the ailments or how they were treated. maps and tables are easy to understand, very self-explanatory, as well as incorporated into the theme of the chapter with a molding precision. My over all analysis of this novel is that its unusual format may be difficult for some readers at first while others will be able absorb the content immediately. Furthermore, the use of the table and map broaden the comprehension of the authors message. The historical monograph, A Midwifes Tale, can be related to several works published about womens role during the eighteenth century. The reader can see that Martha was a self-sustaining woman who worked hard at keeping her family needs met. The Journal of Mme Knight, by Theodore Dwight, is an example of another work relating to the issues Martha encounters throughout her life. Sarah Kemble, also known as the Widow Knight or Madam Knight, kept a detailed diary about her travels and the customs of the people she encountered. Sarah Kemble is similar to Martha because she to managed a business, and therefore was self-sustained. The Journal is also considered one of the most authentic chronicles of the eighteenth century colonial life in America. 6 Another work that shows the eighteenth century ideology of women is The Making of a Middle-Class Lady7. It illustrates the daily chores of women and the goods/services they offered during the era. Ulrich, the author, discusses the web of women in the society and their separation from legal affairs. In comparison, both works, A Midwifes Tale and The Making of a Middle-Class Lady, encompass political, economical, and sexual transformation and the significance it had on women. Both works discuss various trades women performed, such as the production of cloth or other jobs of trade, or midwifery. Furthermore, they both expose the difference between the mens social hierarchy and the womens social web, and how they interact with each other. As seen in Marthas Diary, much of the community revolved around the mill, which is an important factor that comes into play as the pre-industrial revolution begins, and womens work starts to devaluate thus molding a prescription of the house wife, primary care giver to a child, and in debt to their husbands fortunes. It is difficult to find another source with the same insight as Marthas diary. Although Sarahs diary shows her daily life, she is not in the same field as Martha but did fall within the same womens sphere of this era because she handled her own legal affairs and became a school teacher, whereas Martha only had the education given to her at the beginning and did not involve herself in male affairs. All other sources seem to repeat each other in the prescription of womens duties during the era but lack a true womens insight into the surrounding events. I am compelled, as a reader, to put Marthas diary above all other works we have read because they all seem to originate from the pages of her diary but lacking the substance only the women of the era could fulfill, thus leaving a reader with a prescription rather then a description. .u5c2c0076dd859ccaf34549e3b7382aba , .u5c2c0076dd859ccaf34549e3b7382aba .postImageUrl , .u5c2c0076dd859ccaf34549e3b7382aba .centered-text-area { min-height: 80px; position: relative; } .u5c2c0076dd859ccaf34549e3b7382aba , .u5c2c0076dd859ccaf34549e3b7382aba:hover , .u5c2c0076dd859ccaf34549e3b7382aba:visited , .u5c2c0076dd859ccaf34549e3b7382aba:active { border:0!important; } .u5c2c0076dd859ccaf34549e3b7382aba .clearfix:after { content: ""; display: table; clear: both; } .u5c2c0076dd859ccaf34549e3b7382aba { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u5c2c0076dd859ccaf34549e3b7382aba:active , .u5c2c0076dd859ccaf34549e3b7382aba:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u5c2c0076dd859ccaf34549e3b7382aba .centered-text-area { width: 100%; position: relative ; } .u5c2c0076dd859ccaf34549e3b7382aba .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u5c2c0076dd859ccaf34549e3b7382aba .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u5c2c0076dd859ccaf34549e3b7382aba .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u5c2c0076dd859ccaf34549e3b7382aba:hover .ctaButton { background-color: #34495E!important; } .u5c2c0076dd859ccaf34549e3b7382aba .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u5c2c0076dd859ccaf34549e3b7382aba .u5c2c0076dd859ccaf34549e3b7382aba-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u5c2c0076dd859ccaf34549e3b7382aba:after { content: ""; display: block; clear: both; } READ: In A Rose for Emily by William Faulkner, the author uses the element of time to enhance details of the setting and vice versa EssayIn conclusion, though an unusual format, the author maintains the readers attention while addressing various issues that women faced during the eighteenth century, and thus fulfills her thesis in an entertaining approach for the reader. The historical monograph is a unique view of the turmoil during the era while giving insight into the many true duties of women. The author turned history into life, letting the reader walk the footsteps of a midwife and taste the eighteenth century as a whole instead of a selected slice. 1 A Midwifes Tale, p. 27. Also see Oxford Vital Records, p. 82 2 A Midwifes Tale, p. 27. Also see Church Records of the First Church in Augusta, South Parish Congregational Church, Augusta, pp. 100-101. 3 A Midwifes Tale, p. 34 4 A Midwifes Tale, p. 34 5 A Midwifes Tale, p. 33 6 Knight, Sarah Kemble, copyright 1999 Encylopedia Britannica, Inc. 7 Based on the book The History of Women in America by Carol Hymowitz and Michaele Weissman.

Saturday, November 30, 2019

Never Miss a Deadline Again, Five Things You Can Do When Struggling With Assignments

Toward the start of each semester, you ought to get this excellent piece a paper from your educator called a syllabus. The syllabus is genuine my most loved thing about school since it reveals to you how to get extraordinary evaluations in your classes. It furnishes you with all your teachers data in addition to every one of the assignments due that semester (if your educator has a timetable). The moment you get that syllabus or your assignment plan, record everything in your organizer! Its such a kind thing having every one of your assignments in a single place so you can prepare for tests and when you should begin chipping away at huge activities and papers. I likewise dependably endeavor to set updates in my organizer as well, so two weeks previously a test I compose an update in green, and afterward seven days before the trial I write it in orange, and the day of the test I check that in red! That way I know I can begin preparing for these things! Record Assignments In Multiple Places Organizer, Notebook, Phone I generally record my assignments in my organizer, however on the off chance that I dont have that help with me, I log my duties in a few spots. So I have my semester plan for my organizer, week after week assignments in my notepad, and assignments I need to deal with that night in my notes on my telephone. That way I generally realize whats expected at some random time so if I dont have specific timetables or things with me. Fortunately for you, there are a few different ways you can conquer your work and never miss an assignment due date again. From guaranteeing that you do the majority of your perusing to requesting assistance from a coach or an assignment writing and service when you indeed require it, underneath we investigate five things you can do while battling with assignments against a firm due date. Make A Timetable Outstanding amongst other things you can do while battling with assignments is to make a timetable. Understudies can here and there wind up with more leisure time than they realize what to do with, which is the reason making a schedule can help guarantee you dont fall into a period squandering trap and that you dont wind up completing anything by any stretch of the imagination. By separating your restricted time into thoughtful pieces, you will likewise think that its substantially less demanding to keep over your outstanding burden, and never let an assignment escape your attention again. Make Notes We comprehend that making notes about all that you require, and would need to know can be a repetitive errand, yet it is central that you record your essential thoughts or data when you find the opportunity. You may believe that you are sparing time by bouncing straight into writing your assignment. However, you are making it harder for yourself to begin and finish your homework as youll have to prop up back to examine all through the composition procedure. By taking notes, you will have the capacity to frame an arrangement of what you will compose, making the whole assignment writing process that tad less demanding. Do All Of Your Reading Weve all been there. Were allocated perusing to do. However, we disregard it since its not critical in our eyes. Be that as it may, keeping in mind the end goal to abstain from battling with the few assignments that you will have tossed at you, it is principal that you do the majority of your perusing as and when it is doled out to you. This will enable you to pick up a superior comprehension of the assignment you will be set sooner rather than later. So not exclusively will you allow yourself to out now, yet when the time comes to compose your A-review assignment as well! Request Help On the off chance that you require it, request help! On the off chance that there is any uncertainty in your brain, regardless of whether just a little, about the inquiry or the prerequisites of your given assignment, dont be hesitant to approach your mentor for help. It is much better to begin appropriate than a need to re-compose a transfer you invested hours writing again starting with no outside help since you didnt completely comprehend the necessities of the undertaking. Plan Your Assignment Structure Before you begin writing your assignment, we unequivocally recommend that you plan your assignment structure first. It very well may be as itemized as you like yet ought to contain your presentation focuses, principal contentions and arranged an end to help guarantee you can separate each segment of your assignment easily. This will likewise help ensure that your assignment writing stays on track and that you are not lost for words. is offering best assignment writing tips and essay writing services. From guaranteeing that you do the majority of your perusing to requesting assistance from a coach or an assignment writing service when you indeed require it, apply above mentioned five things you can do while battling with assignments against a firm due date. You may enjoy these things by ordering from best service in the USA.

Tuesday, November 26, 2019

SAT Preparation - PrepScholar 2016 Students Encyclopedia

SAT Preparation - PrepScholar 2016 Students' Encyclopedia SAT / ACT Prep Online Guides and Tips There are numerous and diverse resources for students to prepare for the SAT. Preparing for this important exam has been shown to be strongly correlated with scoring highly and improving scores between test administrations. Because the SAT largely differs in question type and pacing from most classroom exams, students tend to benefit from familiarizing themselves with the test before taking it. Note: this article is a series in the PrepScholar2016 Students' Encyclopedia, a free students' and parents' SAT / ACT guide that provides encyclopedic knowledge. Read all the articles here! How many points can SAT prep help? Studies have shown various levels of score improvement following SAT preparation courses. According to the Johnson San Francisco study in 1984, students showed an average increase of 178 points on a 1600 SAT scale following a 30 hour prep course. On a 2400 SAT scale, the equivalent is an SAT improvement of 267 points. A study from Ohio State University showed that students achieved score improvements of greater than 60 points following SAT review. Despite many rigorous scientific studies showing SAT score can be improveddramatically by prep,the College Board maintains its official politically motivatedposition that the SAT cannot be prepped. The College Board benefits from the position that the SAT cannot be prepped so it can maintain the image of the SAT being fair, a key requirement colleges, who are a main driver of College Board's customers. To support the claim that the SAT is uncoachable, it cites research studies that show only about 10 to 20 point score improvements per section following preparation. These studies, however, have raised questions of bias as many werecarried out by College Board and its partner organization, the National Association of College Admission Counseling. Sources of Prep Questions College Board, the nonprofit organization that develops the SAT, releases official practice tests for students to take, some of which are previously administered tests from years past. In addition to these official practice questions, students can find practice questions from various sources, including test prep companies and online classrooms, like Khan Academy. Since SAT prep is a large and varied field, students must be discerning about the quality of SAT practice materials and lessons. Online Preparation Due to advances in educational technology, online SAT courses are a burgeoning method of test prep. Online courses have proven popular among students due to their ability to track student progress, diagnose students' strengths and weaknesses, and customize study plans to individuals. Online prep programs may also offer one-on-one tutoring. Other methods of test prep include one-on-one tutoring, self-study from books, and classes. These methods have varying degrees of effectiveness depending on their quality and the learning styles of individual students. Many students prefer the convenience of online SAT preparation programs, which can be accessed anywhere with Internet. The lessons may be scaffolded to target each student's needs. Students benefit from using a customizable program with high quality content, practice questions, and test-taking strategies. Online programs that incorporate one-on-one tutoring tend to excel in blending the strengths of technology with the benefits of connecting with a tutor. The most effective tutors tend to have extensive teaching experience and to combine individualized instruction with student support. Other Preparation Methods Some students opt for one-on-one tutoring as their main method of SAT preparation. The most helpful tutors thoroughly understand their students' academic profile, map their progress, and created individualized study plans. The least effective tutors simply sit beside students as they do practice problems and lack the ability to communicate clear explanations or effective strategies. One common downside of one-on-one tutoring is its high cost, with many tutors charging hundreds of dollars per hour. Another method of SAT preparation comes in the form of classroom courses. Students may gather for a number of weeks to learn about the SAT, take practice tests, and learn lessons. While SAT preparation classes can be useful to many students for covering the basics andexposing students to SAT practice, they are often lacking in individual instruction and can be relatively expensive. Finally, many students self-study from SAT preparation materials and books. College Board's Official SAT Study Guide, commonly referred to as the "Blue Book," is a key resource due to its ten official practice tests, though most SAT tutors agree that it is lacking in content review and test-taking strategies. This mode of SAT preparation requires independence, self-discipline, and self-directed study habits. To effect score improvements, students must ensure that they are using high quality resources with relevant information and practical tips. Read more from theSAT Encyclopedia! Further Reading Complete Official SAT Practice Tests, Free Links The 10 Best SAT Books Recommended for SAT Prep How to Get a Perfect SAT Score, by a 2400 Full Scorer

Friday, November 22, 2019

Archaeopteris - The First Modern Tree on Earth

Archaeopteris - The First Modern Tree on Earth Our earths first modern tree establishing itself in developing forests emerged around 370 million years ago. Ancient plants made it out of water 130 million years earlier but none were considered true trees. True tree growth only came about when plants overcame biomechanical problems to support additional weight. The architecture of the modern tree is defined by evolutionary features of strength that builds in rings to support greater and greater height and weight, of protective bark that shields the cells that conduct water and nutrients from the earth to the furthest leaves, of supportive collars of extra wood that surround the bases of each branch, and of internal layers of wood dovetail at branch junctions to prevent breakage. It took over a hundred million years for this to happen. Archaeopteris, an extinct tree that made up most of the forests across the earths surface in the late Devonian period, is considered by scientists to be the first modern tree. New collected pieces of fossils of the trees wood from Morocco have filled in parts of the puzzle to shed new light. Discovery of Archaeopteris Stephen Scheckler, a professor of biology and geological sciences at Virginia Polytechnic Institute, Brigitte Meyer-Berthaud, of the Institut de lEvolution of Montpellier, France, and Jobst Wendt, of the Geological and Paleontological Institute in Germany, analyzed a trove of these African fossils. They now propose Archaeopteris to be the earliest known modern tree, with buds, reinforced branch joints, and branched trunks similar to todays modern tree. When it appeared, it very quickly became the dominant tree all over the Earth, says Scheckler. On all of the land areas that were habitable, they had this tree. Scheckler goes on to point out, The attachment of branches was the same as modern trees, with swelling at the branch base to form a strengthening collar and with internal layers of wood dovetailed to resist breaking. We had always thought this was modern, but it turns out that the first woody trees on earth had the same design. While other trees quickly met extinction, Archaeopteris made up 90 percent of the forests and stayed around a very long time. With trunks up to three feet wide, the trees grew perhaps 60 to 90 feet tall. Unlike present-day trees, Archaeopteris reproduced by shedding spores instead of seeds. Development of the Modern Ecosystem Archaeopteris stretched out its branches and canopy of leaves to nourish life in the streams. The decaying trunks and leaves and the altered carbon dioxide/oxygen atmosphere abruptly changed ecosystems all over the earth. Its litter fed the streams and was a major factor in the evolution of freshwater fishes, whose numbers and varieties exploded in that time, and influenced the evolution of other marine ecosystems, says Scheckler. It was the first plant to produce an extensive root system, so had a profound impact on soil chemistry. And once these ecosystem changes happened, they were changed for all time.   Archaeopteris made the world almost a modern world in terms of ecosystems that surround us now, Scheckler concludes.

Thursday, November 21, 2019

The Crusades as a Religious Endeavor Essay Example | Topics and Well Written Essays - 1500 words

The Crusades as a Religious Endeavor - Essay Example Islam not only posed the threat of a rival religion, they also posed the threat of a rival culture (Rosenthal, 2005). Cultural and political influence must therefore be considered necessary additions to religion as factors in the ensuing power struggle. A thousand years after the Crusades, little has changed, with Christianity, Islam and Judaism vying for control throughout, not just the area of the Byzantine Empire, but the world. Again, culture and politics must be considered as well as religion. In the name of democracy, President George W. Bush considers the war in Iraq a quest for freedom, but a large contingent in the Middle East are followers of Islam, and in this respect consider the effort by Western nations to change their culture and religion in the name of democracy to be unacceptable. Great Britain's Tony Blair has remained committed to Bush's actions in Iraq, but the people of Great Britain are more realistic than the Americans as to the economic, political and cultural aspects involved in the Iraqi War. Perhaps, by studying the results of the Crusades, its effect on different populations might be an indicator of the importance of world cultural studies. A study of the Crusades might offer a different viewpoint of the present wars in which religion happens to play a major role. Pope Urban II as a Catalyst Pope Urban II has been credited with initiating the Crusades. He was elected as Pope in 1088 but did not take the papal throne until six years later, having been in exile on the Island of St. Bartholomew. Political issues kept the Byzantine Empire in a state of flux, and Urban was faced with many difficulties. The timing of his ascension, however, was in his favor. Not only was he a truly religious person with a focus on sharing Christianity throughout the world, he was also charismatic, and when he broached the idea of a Crusade against the enemies of the Christian faith at a council meeting in Clermont in 1095, it turned out to be a matter of good timing and use of imagination on his part. He strongly appealed to the general public, and the Crusades became a major undertaking, encompassing several countries (Butler, 2003). Appeals were sent out all through Europe urging people to take the cross. It must be noted, however, that one benefit of the Pope's appeal was to offset the pro pensity for violence within the Byzantine Empire__with individuals acting from personal and political motives__and the desire for economic expansion (Sloan, 2000). The Crusades gave society a common goal, and after a life of exile, upheaval and poverty, Pope Urban II finally was able to carry out his providence. The so-called "People's Crusade" was successful initially, but success was followed by failure, and a new crusade was begin in 1100, the second of eight formal crusades, and this army too was destroyed in 1101. For almost two hundred years, the Crusades affected a broad geographical and cultural area which carries through into the

Tuesday, November 19, 2019

Coal impact on the environment Essay Example | Topics and Well Written Essays - 750 words

Coal impact on the environment - Essay Example They tend to have an effect on the air, water as well as the animals. It also harms the health of the human beings (Finkelman et al 1999; Hill 2010). The burning of coal results in the production of many chemical substances which mainly include carbon dioxide, sulphur dioxide and nitric oxide. Coal also does not undergo complete combustion and ash is a substance which remains after the combustion of coal. Carbon dioxide is a greenhouse gas and it is released in very high amounts by the burning of coal. This increase in the amount of carbon dioxide in the air results in increasing the temperature of the world and promotes the phenomenon of global warming. Sulphur dioxide is also a harmful gas and results in the formation of acid rain. Nitric oxide is also a toxic gas which can result in the formation of an even more unstable substance known as toxic and at the same time nitric oxide also has the capability of causing acid rain (International Labour Office et al 1994). The quantity of ash that is released during the process of mining and burning is extensively high. It has been analyzed in the United States on an annual basis approximately 100 million tons of ash is produced due to the combustion of almost one billion ton of coal. Forty percent of the ash can be reutilized for forming other products which include cement but a large proportion still remains. The ash has a tendency to accumulate on land as well as it can make its way towards the water reservoirs and contaminate them by forming acids and follow the process of further addition of metals. Ash is disposed off in areas under the land and it is also kept in ‘ponds’ so that it can stay moistened. If proper regulations are not undertaken underground ash can also enter the underground water. Ponds also need to be checked and regulated because an incident occurred in the year 2008 when there was a spillage of the moistened coal and it resulted in contaminating the water in the river and a group of Tennessee individuals (Hill 2010; Mackenzie et al 2005). The mining of coal also results in the production of radioactive substances; though the quantity of the released substances is not very high. It has been analyzed that the population residing near the coal plants receive a higher rate of contact with these radiations than do the people who reside near nuclear power plants. This is because of the fact that the regulations at the nuclear power plants are strict and hence they minimize the release of radiations into the atmosphere (Hill 2010). The procedure of the mining of coal also carries many environmental affects. The mining which takes place on the surface as well as underground mines result in the contact of the rocks which are made up of sulphur to air and oxygen. This results in the formation of sulphur dioxide. This acid further tends to worsen the effect by acting on the rocks and causing them to release metals. The acid plus the metals gain ways to the water reserv oirs. This results in contaminating the water reservoirs and it harms the life that exists in water. It is found to be harmful not only for the microorganisms in the water but it also results in the death of fishes. These contaminated substances also tend to impact the land as well (Hill 2010; Mackenzie et al 2005). The burning of coal can also result in many harmful effects on the health of the human beings. ‘Black Lung Disease’

Saturday, November 16, 2019

Macroeconomic Performance of the Ten Countries Essay Example for Free

Macroeconomic Performance of the Ten Countries Essay What was Expected from the Governments and Central Banks of These New Entrants? On May 1, 2004, ten Central European and Mediterranean countries joined the EU and their names are as follows: Czech Republic, Estonia, Cyprus, Latvia, Lithuania, Hungary, Malta, Poland, Slovenia, and Slovakia.   This raised the enlargement to 25 countries that comprise of 450 million people, which is more than the population of the U.S. and Japan combined. [1] This accession will compel the new member states governments to utilize the EU legislation without much exception and will enable them to enjoy all the advantages that go with it, and once they go through a certain period and show improvements, they will be included in Schengen area and the euro zone. In addition, from the year 2004 to 2006 they are entitled to receive a payment of 45 billion euros in a form of a community aid and 30.7 billion euros in a form of payment appropriations.   As a result, according to two treaties that were signed in Amsterdam and Nice that were the basis through which the enlargement was conducted, the intent of the whole arrangement was to make the enlarged Europe more democratic, transparent, and effective calling on all governments to work on these areas. The end result of the enlargement had been labeled as a historical precedence that will change the dimensions of the continent and it is believed to put the division of the past behind ushering in democracy, freedom, and stability to the whole region.   At the same time it is believed that it creates opportunities for all involved where the early 15 nations business share and economical activity had increased, while the new entrants have also reaped economic advantage that was not available for them before the assesstion. What had come into existence is a union of 450 million people and had already represented at the time the union was effected one-fourth of the world wealth, giving the region a new leading economic power.   In addition, the role the continent is playing in the international scene had gotten enhancement, especially in security and defense policy. [2] The new states and their governments that are joining the Union will have to adhere to the Copenhagen Criteria and it has three components.   The first component is any of the nations that are joining the union should reach a certain level of stability and should have establishments that oversee and guarantee democracy, the rule of law, human rights, and the observing of the rights of minorities.   Then the second one which is an economic criteria stipulates that the nations adhere to the principle of the market economy and have a mechanism that enables them to deal with competitive pressure and market forces that will be directed at them after joining the EU. What is called acquis communautaire adoption criterion anticipates that the candidates should put themselves in a position to shoulder the membership’s obligations, as well as a strict adherence to the principles of the political, economic, and monetary union.   Through all this process the Union is responsible for evaluating, recommending, and approving of the states’ performance and it will evaluate the capacity of the Union to absorb more members without affecting the normal functioning of the existing Union members. The process starts when European countries apply to join the Union and that will be evaluated based on how the applicant nations with the guidance of their respective governments meet the Copenhagen political and economic criteria, and the accession is granted only when the requirements are met.   The nations through their governments will have to agree to apply the EU legislation that is over 80,000 pages from day one, even if there are a few exceptions that will allow the new entrants a leeway as long as it is not going to intervene with the smooth operation of the activities of the other members.   When the EU is convinced that the applying nations meet all the requirements of the Copenhagen criteria the next phase will kick in, which is the signing of the accession treaty. [3] The ten Central European and Mediterranean states, through macroeconomic plans that were introduced and carried out by their respective governments had gone through this process before getting permission to join the Union.   And once they joined the Union there are more questions arising because it is difficult to say what currency they should be using and as long as they meet the Maastricht criteria they are expected to the join the euro zone by abandoning their own currency. Here the various central banks play a leading role because it is known that it will take them some time to meet the requirements and while working to meet the requirements they will have to focus on their structural and economic reforms so that they will manage to have a better convergence in both nominal and real terms.   Since the other requirement before joining the euro is entering the Exchange Rate Mechanism of the European Monetary System, the ERM II will require them to abandon their own monetary policy. It does not necessarily mean this route fits everyone since the rigorous stability requirement applied by the exchange rate could derail the existing stand of their current account, simply because when there is appreciation in their currency it will affect their competitiveness, because of the high price they will be forced to charge.   The other worry is joining the ERM II should not result in overvaluing their currency whereby they will be obligated to devalue their currency in the two years test period.   From what had been witnessed most of the nations had an open economy that was heavily reliant on trade with EU countries and if they can eliminate the transaction cost in any way, which would include currency exchange, they will embrace it. [4] The final outcome was from the ten countries that joined the Union Slovenia, Lithuania, and Estonia were able to enter the ERM II and were expected to join the euro zone on January 1st, 2007, simply because they had met most of the criteria. But the only nation that managed to join the euro was Slovenia showing that the others did not meet some of the requirements, they need more time to make the adjustments, and might be able to join the euro by the year 2008. The other three nations Latvia, Cyprus, and Malta had also joined ERM II and could join the euro in 2008.   The remaining members Czech Republic, Slovakia, Hungary, and Poland are deemed to wait longer to better meet the criteria.   [5] The Macroeconomic Policy These Nations had been Following After Joining the Union. To address this question starting from the Central European nation that just joined the euro zone in January 1, 2007 might shed light on the areas that the nation did right while the other two nations Lithuania and Estonia will have to wait at least up to 2008 to be evaluated if they would meet the requirement of the ERM II.   The nation had $17,290 per capita income in 2005, it had a population of two million people, and it was among the most successful transition economies.   The nation’s GDP per capita in 2005 was 81% of the other EU members, which must have helped it to get a high score, since it is the only nation that has such a high percentage. According to the report the prosperity of Slovenia is due to its gradual and consensual approach to reform, which has made it different from the other nine countries.  Ã‚  Ã‚   It has worked hard to attain this position although lately its competitiveness is eroding.   Another area that had lagged was foreign direct investment (FDI) due to the slower pace and the general reluctance to interact with foreign sources resulting the FDI to be 1.2% of GDP between 1997-2005.   Even if it had reached once to 7% of GDP it had gone back to .02% of GDP in 2005 and this falling behind is curtailing the advancement the nation could have attained, yet it did not prevent it from joining the euro, simply because the possibility is within reach. [6] As far as economic growth is concerned the nation has averaged 3.9% it the mentioned period and had managed to fend off macroeconomic imbalances that were commonplace with the other transitional economies and its tight fiscal and monetary policy had resulted in allowing it to have a near balanced budget with a 1.7% budget and 1.1% current deficit, another good performance that was coupled with an enhanced foreign trade. The country also had managed to bring inflation under control and it had it at a single-digit since 1996.   Another advantage the nation had was it had a strong performance where the GDP growth was at 3.9% fueled by a rise in foreign demand.   In all this, inflation was under control at 2.5% and that was attained by allowing wage to lag behind productivity growth, by making up for oil price increase by introducing excise tax, and by attaining a stable exchange rate. [7] The next nation to look at is Lithuania which was among the three nation that were slated to join the eruo in 2007,   but has not made it and looking at its performance might shade light on how it fared.   The first glaring difference between the two countries is the per capita income where in Lithuania it was $7,210 in 2005 even if the population in Slovenia was only 1.4 million, whereas the population in Lithuania is 3.4 million. Other than that the GDP growth of 7.5% was much higher and it was the fastest growing economy in the region. It also had much more to export, which included refined oil, machinery and equipment, and textile.   It is not different than the other countries that are heavily dependant on the euro zone for their exports, the average being 60%.   The other advantage it had over Slovenia was it had enjoyed a peak GDP growth of 10% in 2003 since it was in a better position to create wage growth by bringing down unemployment from 17% down to 6% and in doing that it had got help from the EU fund that it was entitled for joining the Union in 2004. At the same time, it had a much better domestic demand that is enabling it to drive its economy.   Yet, there is a sign of heating of the economy as there is shortage of workers since they are migrating to the UK and Ireland.   After joining ERM II it had shown an impressive commitment to adopt the euro and was able to liberalize its pricing and most of its trades had been directed to the EU zone.  Ã‚   The other factors such as privatization had been taken care of to the point where all factors of production are in the private hands, and it had also been working in the area of FDI that is seeing a steep increase.    If there is another aspect that is holding it back it could the unparalleled poverty level in the nation and it is at 52% purchasing power parity compared to 81% enjoyed by Slovenia.   And one of the reasons that it did not qualify might be at least 16% of its population lives under the poverty line and poverty is widespread in the rural area where it is considered to be up to 57% of the poor are living.   That area might be the reason that contributed to its being held back for a while since all the indicators including health and education are going badly lacking in these regions. [6] Estonia that was in the list to join the euro in January 1, 2007 with the other two nations is a relatively smaller country with a population of 1.35 million and its per capita income is $9,100.   This nation has fewer natural resources and it depends on trade for the most part.   Its main specialty export is telecom.   Its GDP growth performance was not bad at 7.5%. The country had been a main gateways for trade between the Soviet Union and the West that is said to have given it some advantage and because of that the education level and the standard of living of the people was higher that other member countries. In 2005 its GDP growth had reached 9.8% resulting in the heating up of the economy as the unemployment rate had gone down, while at the same time workers are migrating to the other EU countries.   What is driving its economy is the domestic demand that is expanding due to income growth and credit expansion that is also taking export higher.   If there is any problem highlighted it is the overheating of the economy and the current account defect that is at 11% of GDP in 2005 and was at 13% in 2004, which would mean this could be one of the reasons why its plan to join the euro in 2007 had been postponed. [8] The other three nations slated for 2008 to join the euro are Latvia, Cyprus, and Malta.   Latvia has a per capita income of $6,750 and has 2.3 million people where one-third of them are living in the capital city.   The nation has few natural resources and is an importer for the most part and the import includes natural gas, oil, and electricity.   The source of GDP for 2005 was 23% industry, 73% service, and the remaining 4% was from agriculture. The country had some difficulty adjusting after it left the Soviet Union and the situation was turned around by the fiscal discipline the government introduced, where a cap was put to the subsidies enterprises were getting.  Ã‚   The government’s early liberalization effort had enabled the nation to join WTO in 1999.   Overall, the nation had converted itself into a market economy, which enabled it to join the EU in 2004.  Ã‚   Market and price liberalization, privatization, restriction on foreign transaction all are in the right perspective and the result had been positive where privatization is almost complete. Other areas overhauled were the legal system, institutions, and the social safety net.  Ã‚   The GDP growth had made it to 10.2% in 2005 and the unemployment rate was at 8.7% in the same year.   Some of the malice that is affecting the other nations such as low-income level, which was at 47% of the EU average had not spared this nation either.   Because of that labor migration had been escalating after joining the Union which is feared to create a problem in the long run while at the same time the population is aging.   Because of this there is a fear of overheating and the deficit has reached 12.4% while inflation is at 6%, which has contributed to the holding back of the nation from joining the euro and that might be possible in 2010. [6] Cyprus on the other hand has a highly developed infrastructure with a population of 784,000 and with a per capita of $7135.   The macroeconomic policy of the government had focused on meeting the requirement of joining the EU.   There was oil discovery in the sea south of Cyprus and negotiations had gone underway with the neighboring Egypt how to exploit the finding. The overall market structure is based on a free-market basis and is heavily dependant on the service sector, yet there is lack of investment from government and private sector, while at the same time the high cost of freight had been scaring business away, and all this had been worsened by the lack of skilled labor.   In spite of this handicap, the GDP growth rate had made it to 11.4 in 2004 and yet it is lagging behind in attracting FDI.   Even if there is a political problem between the north and south, this particular nation might be among the nations that would join the EU in 2008. [9] Malta is also another island with a population of 404,000, which had transformed itself into a freight transshipment and a financial center as well as a tourist destination.   In addition, it has some limestone and a better productive labor force than Cyprus where the economy is dependent on foreign trade, manufacturing, and tourism.   Its per capita income is much higher than most countries at $20,300 and the unemployment rate for 2006 was at 6.8%.   The island has liberalized its market and privatized some government-controlled firms and the possibility that it might join the euro zone is there. [9] The other nations Czech Republic, Hungary, and Poland, are much bigger nations and there is Slovakia also that are slated to join the euro gradually after meeting the criteria, which might prove to be difficult to them because of their size.   If we take the case of the Czech Republic, it has a population of 10.2 million and a per capita income of $11,110 making it among the highest income earning countries.   After joining the EU in 2004 the process of transforming the economy from centrally planned to a market driven economy is almost complete.   There had been a considerable fiscal consolidation, and the inflation is low at 1.8%, while at the same time it had no problem with its balance of payments. Foreign direct investment is 50% of the GDP making it the only nation that enjoys such inflows of investment, yet, in spite of it, it had a high unemployment rate of more than 8% and is persisting, which might have been because of its high population that is not affected much by the migration of labor. The GDP growth for 2005 was 6%, attained mainly through export created through FDI in the automotive sector.   The fiscal deficit for 2005 was at 3% whereas the current account deficit fell to 2.3% for 2005.   Because of the high unemployment, which is the outcome of sluggish economic performance it might have to stay a bit longer before joining the euro, although the expectation is it will meet the requirement eventually. [10] More or less, the same is applicable to the other three countries Hungary, Poland, Slovakia whose population is 10 million, 38 million, 5.4 million respectively, making Poland the highest populated country among the EU-10 countries.   While Hungry had $10,050 per capita income, Poland had $7,110, and Slovakia had $8,130 in 2005.   Poland had to deal with structural reforms to consolidate public finance, tackle unemployment and poverty, work on making the nation attractive for business by introducing a more efficient government. The fact that up to seven million people live in poverty does not make it look as a good candidate for the euro yet and the unemployment rate is the highest at 16%.   However, the situation is a bit changing after joining the EU in 2004 and there was a growth of 5.3% in GDP in 2004, which created high consumption level, investment opportunity, and a better exporting level, and eventually it will make it a proper candidate to join the euro as it is working to meet that goal.   Its FDI is at 5% of GDP and that is low for such a large country although its inflation rate is low at 2.1% and its current account defect is also under control. [6] On the other hand, Hungary is in a much better position since it was able to attract FDI that is enabling it to build a robust private exporting sector.   If there is a problem, the budget deficit is at 8% due to higher public spending and tax reduction, which could affect the economy in the long run.   Inflation had slowed down to 3.5% for 2005 which was due to regulated prices and a decrease on indirect taxes. The unemployment rate stood at 7.2% in 2006.   Even if the government had introduced a fiscal consolidation program what might be needed to change the situation is a long term structural reform.   Hungary is moving steadily to join the euro gradually, and is better situated than the rest of the countries that are in line to join the euro in the coming years. [6] Slovakia is also in a similar situation with the others where it had a 6% GDP growth in 2005 and had unemployment rate of 16.2%.   In recent years, especially after joining the EU in 2004 it had undertaken major steps to decentralize its economy.   The government had introduced reform in many areas including welfare, pension, health care, labor market, and public finance.   Its GDP for 2005 grew by around 6% and inflation was at 2.7%. The fiscal deficit was at 3.3% while the current account deficit had been 7.8% of GDP for 2005 and it had FDI rate 2.7% of GDP.   Overall, it is working toward meeting the EU’s criteria to join the euro although it is difficult to say when it will meet all the requirements. [6] The conclusion is, there are requirements these nations will have to meet and the major ones are to tackle high level of inflation, a budget deficit below 3% of GDP, the public debt has to be at a manageable level, and maintaining a long term low interest rate in parallel to other central banks. If these are in place side by the side with the Maastricht and the Copenhagen Treaty criteria the time it will take them to join the euro will be shorter. Otherwise, their participation could affect the smooth operation of the whole Union, as well as it will put them at a disadvantage offsetting their whole fiscal and monetary policy. [11] REFERENCE The Union Welcomes Ten New Countries [Online]. Available:   Ã‚  Ã‚  Ã‚   http://www.delnam.cec.eu.int/OurNewsletter/2004/ECNewsMay04.pdf.   March 14, 2007. European Parliament Fact Sheet. [Online]. Available:   Ã‚  Ã‚   www.europal.europa.eu/facts/2_3_0_en.htm.   March 14, 2007. The Challenge of European Economy in 2004. [Online]. Available:   Ã‚  Ã‚  Ã‚   www.ecb.int/press/key/date/2004/html/sp040129.en.html.   March 14, 2007. Euro in a Wider Circle. [Online]. Available:   Ã‚  Ã‚   www.ece.int/press/key/date/2004/html/sp041119.en.html.   March 14, 2007. Redefining Europe. [Online]. Available:   Ã‚   www.inter-dicpilanry.net/AUD/AUD2/s10.htm.   March 14, 2007. World Bank. [Online]. Available:   Ã‚  Ã‚  Ã‚  Ã‚   www.worldbank.com (countries).   March 14, 2007. ECB Panel Intervention at the Euro Conference. [Online]. Available:   Ã‚  Ã‚   www.ecb.int/press/date/2007/html/sp07115_1.en.html.   March 14, 2007. Commission Assessment of Estonia Convergence. [Online]. Available:   http://ec.europa.eu/economy_finance/about/activities/sgp/country/commass/ee/ass_ee20032004.   Ã‚  Ã‚   March 14, 2007. CIA The World Fact Book. [Online]. Available:   Ã‚  Ã‚  Ã‚   https://cia.gov (countries).   March 14, 2007. Macroeconomic. [Online]. Available:   Ã‚  Ã‚  Ã‚  Ã‚   http://www.cerge-ei.cz/pdf/books/pdf_0304/III.pdf.   March 14, 2007. The European Union and Its Expanding Economy. [Online]. Available:   Ã‚  Ã‚  Ã‚  Ã‚   http://jpn.cec.eu.int.home/speech_en_speech%2009/2005.php.   March 14, 2007

Thursday, November 14, 2019

Excavating an African Burial Ground: Lack of Funding Could Mean Loss o

Excavating an African Burial Ground: Lack of Funding Could Mean Loss of Information Forever As children growing up in the United States, educated through our public schools, we learned about the institution of slavery, which was an integral part of life in our country for nearly 300 years. We do not usually question the historical facts we learned about slavery or ask how we know so much about the history of these people (the enslaved Africans in America) who left behind so little written record. In the classroom, archeologists do not receive much credit, but it is largely through their work and research that we have been able to learn about â€Å"America’s diverse ethnic heritage† (Singleton 155). In the 1960’s, excavations of slave cabins inspired a new area of research. Today’s field of African-American Archaeology was born from these first digs, only three decades ago. Archaeologists carefully and skillfully collect artifacts, which are â€Å"tangible material remains and by-products of behavior† (Singleton 156). Through historical and ethnographic analysis and interpretation, archeologists are able to put together pieces of the daily lives and living conditions of the first African-Americans. One such African-American archaeological dig, called the African Burial Ground Project, is currently taking place in New York City. In 1991, the construction crew for a new, $276 million federal office building stumbled across the skeletons of what are now known to be early African slaves. The United States General Services Administration (GSA), the government agency that handles the funding and administration of all federal property, began further exploration of the site. Today we know that this â€Å"plot of land is just a sliver of the 18th ... ...es 21 Mar. 1999: Sec. 14, pg. 6. Gaines, Patrice. â€Å"Bones of Forebears; Howard U. Study Stirs Ghanaian Chiefs to Honor Ages-Old Link to U.S. Blacks.† The Washington Post 3 Aug. 1995: B01. LaFee, Scott. â€Å"Grave Injustice; Archaeologists are Beginning to Unearth the Buried, Tragic Secrets of America’s First Slaves.† The San Diego Union-Tribune 15 Sep. 1999: E-1. â€Å"New Chief of African Burial Ground Project.† The New York Beacon 16 June 1999: 12. Satchell, Michael. â€Å"Only Remember Us.† U.S. News & World Report 28 July 1997: 51-52. Singleton, Theresa A. â€Å"The Archaeology of Slave Life.† Before Freedom Came: African-American Life I the Antebellum South. Ed. Edward D.C. Campbell, Jr. and Kym S. Rice. Charlottesville: The University Press of Virginia, 1991. 155-175. Staples, Brent. â€Å"Manhattan’s African Dead.† Editorial. The New York Times 22 May 1995: A14.

Monday, November 11, 2019

A Brief Survey of the Languages of the Neelam Valley

[i]A brief Survey of the Languages of the Neelam Valley Khawaja A. Rehman[1] The Neelam Valley, formerly known as Drawa, is located at an altitude of 4000 to 7500 feet. However, the mountain peaks around the valley range up to 17,000 feet. The total length of the valley is about 150 kilometers and according to the census of 1998 the population was 120,661 with 84 separate villages (online census report). In 2005, it was given the status of a distinct and has been known since then as District Neelam with two tehsils: Sharda and Athmuqam. Previously, it was subdivision of Muzaffarabad District with its headquarters at Athmuqam. Before partition in 1947, the tehsil headquarters of the area was Titwal, now under Indian control, the area was known as Drawa and the river flowing through the valley was called Kishan Ganga (Stein: 1900). The name of the river after partition has been changed to Neelam and the name of the territory to Neelam Valley. The word Neelam comes from the name of a village on the right bank of the river about 12 kilometers upstream from Athmuqam. Moreover, there are also two other small villages known as Neelam in the region. The river Neelam originates from Indian administered Kashmir and enters Pakistani administered Kashmir, known as Azad Kashmir, at Taubutt. Beyond this point it is still referred to as Kishan Ganga. The population lives on both sides of the Neelam or Kishan Ganga River. A few villages on the left bank of the Neelam valley fall under Indian control This region remains a relatively uncharted territory on the linguistic map. The Linguistic Survey of India (edited by Grierson in the early 20th century) does not contain substantive information on the languages of the valley, and neither does one find much information about the area in the more recent literature (Schmidt: 1981, 2002, Koul: 2004, Hook and Koul: 2002, Radloff: 1999, Grimes: 2000, O’Leary: 1992). The fact that the Line of Control runs right through the valley is one obvious reason as to why the area is hardly accessible to researchers presently. However, before partition the area was inaccessible due to nonexistence of road link In this paper, I present a brief overview of the language varieties spoken in the Neelam Valley based on recent research as well as my experience as a resident of the area. These varieties include forms of languages that are spoken widely elsewhere, such as Hindko, Gojri, Shina (Guresi and Chilasi), Kashmiri, and even Pashto, but also the rather distinct language of the village of Kundal Shahi, located near the Neelam district headquarters, Athmuqam (Rehman & Baart 2005).. Hindko . The Hindko language spoken in the Neelam Valley is usually known as Parmi , by the communities other than the Kashmiries and PArim by the Kashmiries and sometimes Hindko or Pahari as well. The word Parmi or PArim’ is derived from the Kashmiri word ApArim ‘from the other side’ Historically speaking the Hindko speaking communities lived in the highlands of the Kashmir Valley and these highlanders were referred to by the Kashmiries as apArim.. Afterwards the use of this word would have been extended to their language as well. The word ‘pArim’ for Hindko is also used in Indian administered Kashmir as the expression I found in a Kashmiri comedy recorded in Srinagar. The use of Hindko has never been documented before in any part of Kashmir. In traditional linguistic literature the Hindko language spoken in Kashmir is referred to as Pahari In 2004, I recorded a word list, used as part of the Sociolinguistic Survey of Northern Pakistan, from eight different locations in the Neelam valley. I analyzed the word list in collaboration with Dr. Joan Baart, who has been working on the languages of Northern Pakistan for the last 13 years. The analysis of the word list showed that the variety spoken in the Neelam valley was closer to the variety of the Kaghan Valley than that of the Murree Hills. In traditional literature, the language spoken in the Murree Hills is classified as Pahari and that of spoken in the Kaghan Valley as Hindko. The conclusion was also confirmed in informal discussions with the Hindko speakers as well as the Hindko speakers from the Kaghan Valley and Mansehra. This proves that the Northern dialect of Hindko is also spoken in Azad Kashmir and my hypothesis is that same variety is also spoken on the other side of Line of control. There are many villages in Indian administered Kashmir along the line of control, at a distance of only few yards from the villages of Azad Kashmir. The Line of Control actually divides some villages in the Neelam Valley. Linguistically speaking, it may be interesting to look into the speech differences that have evolved during the last 58 years among adjacent villages lying on either side of the Line of control. It is worth distinguishing two populations of native Hindko speakers in the Neelam Valley: ethnic Hindko speakers and the Hindko speakers of other ethnicities. According to the oral histories Hindko speakers came from Mansehra and the Kaghan Valley, which parallels the Neelam Valley where as the non-ethnic Hindko speakers came from either the Valley of Kashmir or other parts of South Asia. In spite of the fact that most of the groups originally speaking languages other than Hindko have shifted to Hindko, they retain a strong ethnic consciousness, identifying along ethnic rather than linguistic lines The variety of Hindko spoken in the Neelam valley very interestingly retains, unlike other varieties of Hindko, Pahari and Punjabi, the old Indo-Aryan voiced aspirated stops /bh/, /dh/, /Dh/, /gh/, in the initial positions. However my present research shows that a shift is going on very rapidly. The reason being that the frequent contact with the Hindko speakers of other varieties of Hindko, Punjabi and Pahari speakers, is a major cause of this change. The shift is quite evident along the roadside and in main towns, where the influx of the outsiders is very frequent. The settlements away from the main road and further up stream from Dudnial, show strong retention of this feature. The influence of the Punjabi is not only restricted to the Phonology but also at syntax level. The dative and accusative marker kUo f traditional Hindko is being replaced by the nuu of Punjabi. Hindko is the predominant language of the Neelam Valley. It is the main lingua franca. Speakers of other languages are usually proficient in Hindko except some women in a few Kashmiri and Shina speaking villages. It is also encroaching upon the languages of smaller groups. Virtually all members of the other language communities are bilingual in Hindko. A process of language shift to Hindko is going on in many of these communities. In some of these communities this process started relatively recently, while in others it has been going on much longer. . Kashmiri Kashmiri is the second largest language of the area. it is spoken by the ethnic Kashmiries. However many kashmiries have switched to Hindko in the last two centuries. The villages where Kasmiri is spoken exclusively as a mother tongue include: Halmat, Sardari, ShunDdas, Tehjian, Malik Seri and Khawaja Seri. Among these the former three are adjacent to each other at the distance of about 193 kilometers from Muzaffarabad, the capital city of Azad Kashmir. And if we go further up the stream we come to Nekro, where majority are Kashmiri mother tongue speakers with a few families of Shina speakers. The village Nekro is adjacent to Karimabad, formerly known as Sutti, where Guresi Shina is spoken as a mother tongue. The residents of these villages are less proficient in Hindko than other Kashmiri speakers of the region. They usually prefer to use Urdu with the Hindko speakers. The latter two villages Malik Seri and Khawaja Seri are adjacent to each other and normally known as Khawaja Seri but the revenue department of the state lists them separately. These villages are bout 130 kilometers from Muzaffarabad. Tehjian, another Kashmiri speaking village, is about seven kilometers further down stream from Khawaja Seri Almost all individuals of these villages are bilingual in Hindko. Apart from these there are some six other villages where Kashmiri is the language of majority group. The variety of Kashmiri spoken in the Neelam Valley is closer to the variety spoken in northern Kashmir especially that of the Kupwara District, of Indian administered Kashmir rather than that of Muzaffarabad city. Although the Kashmiri spoken in Muzaffarabad is intelligible to the Kashmiries of the Neelam Valley, they can understand the variety of Srinagar better than that of Muzaffarabad. The Kashmiri spoken in the Neelam Valley has retained some archaic features. For example, Nealam Valey Kashmiri has daram maj ‘woman’ and daram boi ‘friend’, which are hardly found in other varieties of Kashmiri. The word daram is probably derived from the Sanskrit word dharma. Moreover, my research reveals that the Neelam Valley dialect of Kashmiri retains the third person plural subject agreement suffix –ukh more consistently than other dialects.. Speakers of the Srinagar dialect accept this usage, but it is not in common use, suggesting that it is an archaism. It also shares the retroflex flap /R/ with the variety of Kupwara, which is an alveolar flap in the variety of Srinagar. A historically very important town located five kilometers upstream from Khawaja Seri and Malik Seri, known as Shardi or Sharda, is headquarters of the tehsil of the same name. . A marvelous Hindu/ Buddhist temple is still standing and ruins of a great civilization are still visible. The place had been a seat of learning for a long time and it is likely that the Sharda Script developed to write the languages of the region. The script was developed some 1200years back and was popular in most parts of the South Asia and was named after Sharda (Deamb:online). No substantial research has been carried out so far in Sharda. It is very much likely that the script would have been developed in Sharda as this place had been a very famous seat of learning (Stein: 1900) Before partition the place was frequented by the Hindus from different parts of India and was esteemed sacred. Kundal Shahi Kundal Shahi is a village that is located in the Neelam valley 74 kilometers upstream from Muzaffarabad, the capital city of Azad Kashmir, and seven kilometers from the district headquarters ‘Athmuqam’. The Kundal Shahi anguage is spoken by an ethnic group, called Qureshi. They make up the majority of the Kundal Shahi village. There are some other tribes, but they do not speak it as their mother tongue (Rehman and Baart 2005). The people claim to have migrated from a town called Tajjar, presently in the Indian part of Kashmir some three centuries back. No other variety of the language is known. A first publication on the language, ‘A First L ook at the Language of Kundal Shahi in Azad Kashmir’ appeared in March 2005 (Rehman &. Baart 2005) The tribe comprises approximately 1,500 to 2,000 people(ibid). In recent years a process of language shift has been taking place to Hindko. Almost all members of the community are bilingual in Hindko and are very rapidly shifting to Hindko. Gojri Third largest ethnic group in Neelam valley is Gojars. Basically there are two types of Gojars: settled Gojars and nomads or Bakarwals. Settled Gojars Local folktales indicate that the settled Gojars are the earliest settlers of Neelam valley. They are believed to have migrated to the Neelam Valley to find summer pastures for their goats and sheep and gradually settled down permanently. These Gojars no longer raise sheep and goats on a large scale. Their villages, Marnat, Kharigam, Kuttan and Ashkot, are scattered all over the Neelam valley. The interesting thing about these Gojars is that the majority have abandoned their mother tongue and adopted Hindko. However, there are still a few settlements among the Gojars who speak their mother tongue at least at home. The settled Gojars hardly use Gojri in bazaars and other public places in front of speakers of other languages. The Bakarwals The Bakerwals ‘goatherds’ are those Gojars who still raise goats and sheep. They are not permanent residents of the Neelam Valley, but come during the summer with their animals, especially goats, sheep and mules (for carrying load). They go to high pastures for the summer and sometimes even travel to the Northern Areas and the Kaghan Valley. These people usually go to the Punjab plains and lower parts of Azad Kashmir during the winters. They use the Gojri language in their daily communication and show a strong tendency for language maintenance, reducing the probability of. Language shift among these people in the short term. The total population of these nomadic Gojars is not available. However, according to the crude estimate of the Wildlife Department of Azad Kashmir, the summer of 2005 saw a total of 150,000 goats and sheep traveling into the Neelam Valley (personal communication with Manzoor a local official) Shina Although the Gojars are the third largest ethnic group in the Neelam Valley, third largest language spoken is Shina. Though Shina is only spoken in three villages, there are two clearly different varieties of Shina, Guresi Shina and Chilasi Shina. Guresi Shina Guresi shina is spoken in Taubutt, the last village of the Neelam valley and its adjacent village: Karimabad (Sutti) Taubutt is about 215 kilometers from Muzaffarabad. Both villages are on the right bank of the river Neelam. The language is locally known as ShiNa and some times Dardi. Total population of these two villages was 1332 in 1998 and majority among them are Lone by tribe. Most of the Shina speakers of the area are bilingual in Kashmiri. They use Kashmiri with their neighboring Kashmiries. They have also borrowed many Kashmiri words. Their Hindko intelligibility is very poor and with Hindko speakers they usually use Urdu. Moreover, they don’t consider themselves grouped in any way with the Shina speakers of Phulwei. On the other hand they are culturally closer to the Kashmiri speakers of Halmat and Sardari and associate themselves with these people rather than Phulweites. There are intermarriages between the neighboring Kashmiri communities and there is no record of intermarrying with the Shina speakers of Phulwei. According to my informants the mutual intelligibility with the people of Phulwei is very poor and their language is different in vocabulary and pronunciation. They claim to have relatives on the other side of the line of control and also claim that their variety is similar to the variety spoken in the Gures valley of Indian part of Kashmir. However when I compared some words with the Guresi Shina collected on the other side (Schimdt: 2000) I found most of the words quite different These Shina speakers also claim that they can communicate easily with the people from Qamri – a town in the northern areas – without any difficulty and their variety is quite closer to theirs. Chilasi Shina Phulwei a large village with many sub villages, locally known as Mozas, is at the distance of 180 kilometers from Muzaffarabad Total population of the village was according to 1998 census 2912. My current research shows that the in the beginning, about some two centuries back, the first group of these shin speakers settled at ‘Pain Seri (meaning lower plain). This group included four brothers who had migrated from Nait, a town in Chilas, owing to some family feud. Majority of the people claim to belong to lone tribe, have assumed local titles. Clans living in this village include: Kachray, Nasray, Butt, Sheikh and Rajput etc. The majority belong to Kachray and both Kachray and Nasray claim to belong to Lone clan. It is very interesting that in Taubutt and Karimabad the same tribe is in majority. Grierson (1915) claims by using secondary information, that in Nait , Chilas some people speak Guresi Shina. However neither any research (Schimdt: 2002, Carla: 1992, 1999) reports such kind of variety and the variety spoken by the people of Phulwei also negates the statement of Grierson. My respondents belonged to all groups and all claimed to have come from Nait. Their mutual intelligibility with those of from Nait is far better than the shins of Taubutt and Sutti/ Karimabad. They have their close relations in Chilas and frequently travel to Chilas. However for the last nine years the intermarrying with these people has been terminated. This boycott is a result of feud, which claimed many lives on either side some nine years back. The people in the Neelam Valley are normally very peaceful but the people of Phulwei are known for their feuds and fights all over the region. They themselves also admit the fact. One of my informants told me that there are very frequent murders and narrated that his grand father had committed seven murders, his father three and his son killed a man. Locally these people are known as Dards and they themselves call the Hindko speakers Gojars irrespective of their ethnic group. They have no record of intermarrying with the people of Karimabad/ Sutti or Taubutt. However there are some instances of their intermarrying with the local Hindko Speakers. According to them the Shina or Dardi spoken in Taubutt and Karimabad is not standard variety and refer to it as kachi ‘half-baked’ In the village there are few Hindko speaking households but they are bilingual in Shina Pashto Dhaki and Changnar are two villages of Neelam valley, where Pashto is the mother tongue of all residents. The speakers of the language refer to their language as Pukhto/Pakhto. The population of these two villages, according to1998 census, was 1087 with 170 households. The people claim that some two centuries back their forefathers migrated from Swat, a region in Northern Pakistan, and settled in Dhaki and few others, among these, settled in Kashmir valley as well. The main reason, according to the oral history for choosing the place, was its conducive and rich environment for raising livestock. Dhaki is at about two hours walking distance from the left bank of the river Neelam and later some, among these, shifted to another nearby village Changnar. Both villages are right on the Line of Control, separating Indian part of Kashmir from that of Azad Kashmir. Almost all male members of the group are bilingual in Hindko. Some of the females of the group can understand Hindko but most of them are not bilingual in Hindko. The reason being that the men have very frequent contact with the Hindko speaking population where as the women are less likely to travel outside these villages and have no Hindko speaking community nearby. During the last fifteen years cross border firing between the Indo-Pak troops has caused large scale migration from these villages and this migration has led to the language loss at large scale. It will be very interesting to document the degree of this loss The Pashto spoken by the population is quite different from other varieties of Pashto and is a dialect on its own right. These Pashto speakers can communicate with the Pashto speakers from outside but they can’t understand them fully. My current research shows that they have assimilated many Hindko words into their Pashto, and also have kept some archaic words of Pashto, which are no longer used by the other Pashto speakers in Pakistan. . No linguistic literature has mentioned the existence of Pashto in any part of Kashmir (Grierson 1921, Hallberg 1992, Personal communication with Hook and Koul. To my Knowledge this is only settlement in both parts of Kashmir who speaks Pashto. In the Neelam Valley, apart from these Pashto speakers, there are some other groups who claim to be ethnic Pathans, but have apparently shifted to Hindko long time ago. Locally these groups are still known as Pathans and they also refer themselves as Pathan. Present Member of legislature and minister in the cabinet of Azad Jammu and Kashmir, from the District Neelam, also belongs to the same group. . Conclusion: Apart from these local languages Urdu and English are also used. These languages are medium of instruction. No indigenous language is taught in schools. No standard orthography is available for these local languages. However, Some Kashmiri literatures, especially poetry books, published before partition, are available at some houses. Lots of borrowings from Urdu and English are obvious in these local languages. This is a preliminary overview of the languages of the Neelam Valley. The aim of this study is to introduce this linguistically rich but undiscovered area to the outer world and invite scholars to carry out linguistic research in the region. And also create awareness about the languages loss among the speakers of these languages References: Barbara F. Grimes, Ed, 2000 fourteenth edition) Ethnologue; volume1, Languages of the world; SIL International, Dallas, Texas, USA. (http://www. ethnologue. com/web. asp) Deambi, B. K. Kaul. The Sharada Script:Origin and Development. in Jammu, Kashmir and Ladakh linguistic predicament Eds. P. N. Pushp and K. Warikoo: Himalayan Research and Cultural Foundation Har-Anand Publications online:http://www. koshur. org/Linguistic/3. html Federal bureaue of sensus online: http://www. isepak. com/Forms/VillageListMUZAFFARABAD. pdf. Grierson, George. 1915. Linguistic survey of India, volume 8,part 2, 150-190. Calcutta Hallberg, Daniel G. and Calinda E. Hallberg. 1999. Indus Kohistani preliminary phonological and Morphological analysis. Islamabad: National Institute of Pakistan Studies and Summer Institute of Linguistics. Hook Edwin Peter & Omkar N. Koul. 2002. Eds. Koul N Omkar & Wali Kashi Top ics in Kashmiri linguistics, P: 130- 143, Creative books New Delhi Joan L. G. Baart . 2003. Pakistani languages and society: Problems and Prospects. NIPS and SIL, ed. with Ghulam Hyder Sindhi Koul, N Omkar, 2004,Kashmiri: A Grammatical Sketch In The Indo-Aryan Languages. Eds. George Cardona and Dhanesh Jain, Rutledge, London Local revenue department. The cesus report 1998. O’ Leary, Clear. (ed). 1992. Sociolinguistic Survey of Northern Pakistan. 5 Volumes. Islamabad: National Institute of Pakistan Studies and Summer Institute of Linguistics Radloff, Carla F. 1999. Aspects of the Sound System of Gilgit Shina. Islamabad: National Institute of Pakistan Studies and Summer Institute of Linguistics Rehman, Khawaja. A & Joan Baart (2005) A First Look At The Language of Kundal Shahi in Azad Kashmir, SILewps, 2005-2008, Dallas, Texas, USA. http://www. sil. org/silewp/abstract. asp? ref=2005-008 . Rehman, Khawaja. A. 2005. Ergativity in Kundal Shahi, Kashmiri and Hindko: A paper presented in 11th Himalayan Languages symposium, 6-9Dec 2005, Chulalongkorn University, Bangkok, Thailand Rehman, Khawaja. A. 2006. Hindko: A Grammatical Sketch (Forth coming) Schmidt, Ruth Laila. 2002. A grammatical comparison of Shina dialects in Himalayan Languages past and present, 33:55 Ed, Anju Saxena. Mouton de gruyter, Berlin Stein, M. A. 1999. KalahaNa,s Rajatarangni. A chorological of Kings of Kashmir. Trans. Mirpur: Verinag Publishers. Originally published: London: constable, 1900 ———————– [1] The author is a PhD candidate at Quaid-i-Azam University, Islamabad, Pakistan ———————– [i] Paper was presented at the 19th European Conference on Modern South Asian Studies, Panel 31: ‘Linguistics in Lesser-known languages in South Asia’, 27-30 June 2006, Leiden, The Netherlands. http://213. 207. 98. 217/index. php? q=node/56

Saturday, November 9, 2019

Design and Implementation of a Network Based Security Information System

DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM TABLE OF CONTENTS Cover page Title page Certification Dedication Acknowledgement Abstract Table of contents 1. INTRODUCTION 1. 1Security information 2. Objectives 3. Justification CHAPTER TWO 2. Security concept 2. 1Definition of security 2. Security threats 3. Security & Information CHAPTER THREE 3. Description of the exiting security information system 3. 1Organizational structure 2. Fact finding method 3. Objective of the existing system 4. Programs of the existing system 5. Equipment of the existing system 6. Forms CHAPTER FOUR 4.Design of the network-based security information system 4. 1Method of data collection 2. System design – input, processing, output, information storage and retrieval CHAPTER FIVE 5. Implementation of the new system 5. 1Choice of programming language 2. Program flowchart of security record system CHAPTER SIX 6. Output interpretation CHAPTER SEVEN 7. Conclusion 7. 1Recommendati on ABSTRACT The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system.It also airs the different machines used in information processing system to reduce the much-engaged manual efforts. The system design is also introduced where cone is taken in the planning system, which is very close to the manually processed method, but with serious optimization. The proposed system is a network based expert system. All the work in the system will at the end achieve: -Data security -Handling of files -Speedy collection of information for security analysis -Storage of information for subsequent usage. – A forecast for the future security A dependable standard for decision taking on security matters as well as planning and control measures. -Existing equipment for security information listed and known. CHAPTER ONE 1. INTRODUCTION Law enforcement administrations, Justice systems, legislators and the government functionaries often need information to efficiently disseminate and fulfill their official responsibilities of ensuring maximum security for their subjects. To achieve this, a system of information technology network is needed to aid the management in decision taking about the security of lives and properties.In this work â€Å"DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM† I will take a case study of â€Å"B’ OPS COMMUNICATION OF POLICE SHQ ENUGU† as an existing information network system in the police and analyze their process of data collection and hence design a new system which will enhance the output. 1. 1OBJECTIVE OF THE STUDY The objective of this program is strictly for the production of a reliable system of nation wide crime statistical information from all works and craning for administrative and operational use of th e executive and law enforcement management system.Another objective of this work is to make an improvement in the existing data security system. To create a way of speedy data collections for security analysis. For a network of information technology for security purpose and create a standard management information system forecasting for security together with good decision taking, planning and control programs. 2. JUSTIFICATION The process of executing the task of information management has been manually executed; quite unfortunately manual procedure reduces the output quality and consumed time.This work will examine a new system where th3e much needed human efforts are replaced with machines to achieve fast collection of data and easy processing to obtain healthy outputs. Also the need for information and data in the knowledge base doest not only answer to the problem of information over load but also helps in a state of crime statistics request, wherefore the computerization of s ome of this areas is very necessary because its importance in making crime investigators imbibe new and modernized methods and create public awareness of the society security policy. CHAPTER TWO LITERATURE REVIEW . SECURITY CONCEPT Security is defined in many ways due to the many contexts of its existence. In other words, security generally has to do with protection. It might be protection from undue access. Some attributes security to safe guiding from that, which may or may not lead to destruction. It might also be interesting to understand that security has to do with protection of the environment. It also has to do with valuables; this means that anything has to be secured must have value. Things of less importance to humanity and therefore anything that pose threat to life must also be prevented.Security is a very important issue in any organizations (system), no wonder VINCENT . E. ASOR in his seminar presentation at the Nigerian computer society’s conference of 2002 st ated that an organization with 98 percent security is actually 100 percent insecure. This means that adequate security must be in place for a smooth running of an organizational affair or a system. The police, who is the case study organization here defined security in the police training manual as the protection of lives and property coupled with the maintenance of law and order in a society. 2. 1SECURITY THREATSThey are criminal acts, which have a particular harmful effects on peoples lives and property and do more than interfere with merely private rights. They are simply crimes, Now the above brings us to the crime concept. What is crime? According to the BLACKSTONE, crime is violation of public rights and duties due to the whole community considered as a community. Williams defined crime as acts that is capable of being followed by a criminal proceedings having one of the types of outcome – Punishments. Also Hulsbury’s Law (adopted by the House of Lord’s in Board of Trade V.Ower 1957 as correct) defined crime as an unlawful act or default which is an offence against the public and render the person guilty of the act liable to legal punishment. The summary of the above crime definitions by the police manual defined crime as an unlawful act committed by a person or a group of persons. 2. CHARACTERISTICS OF SECURITY THREATS They are wrong doings which Judges have held, or the parliament has from time to time laid down which are sufficiently injurious to the public to warrant the application of a criminal procedure to deal with them, of course this does not enable us to recognize an act as a crime when we see one.Some acts are obviously harmful to the public that anyone would say they should be criminal and such acts almost certainly are, but there are many others about which opinions may differ widely. According to SIR CARLETON ALLEN, crime is crime because it consists of wrongdoings which directly and in serious degree threatens the sec urity or well being of the society. This explains why acts have to be made crimes either by judicial decisions or by legislation. A crime may remain a crime long after it has ceased to be a threat to the security or well being of the society.This ALLEN’S proposition tells us what (as he thinks) ought to be crime rather than what is crime. The public nature of crimes is evidenced by the contrast between the rulers of civil and criminal procedure. Any citizen can, as a general rule and in the absence of some provision to the contrary bring a criminal prosecution, whether or not he has suffered any special harm over and above other members of the public. As a member of the public he has an interest in the enforcement of the criminal law. 3. CLASSFICATION OF CRIMESThere is a problem that exist in the crime reporting system in Nigeria and especially the B’OPS COMMUNICATION OF THE POLICY, ENUGU STATE BRANCH in particular. This arises in the variations in definition of crimes among localities. This obstacle, as far as uniformity in definitions is concerned was removed by the adoption of a standard set of crime classification generally connotes its content. However in reading the explanation of each category, it is very important to keep in mind that because of the differences between the state codes, there is no possibility in a system such as ‘felony’ and ‘misdemeanor’.Crime classifications are in three categories. Viz crime against persons, crimes against property and crime of violence or crime against local acts. Crime against persons include: -Murder and non-negligent manslaughter -Aggravates assault forcible rape -Forcible rape -Robbery Crime against property includes: -Burglary -Arson -Stealing -Forgery and counterfeiting -Vandalism Crimes against local acts include; -Narcotic -Illegal possession, carrying of weapons -Prostitution and commercialized vice. 4. SECURITY AND INFORMATIONThere is no known security system that w orks without an information technology system. In fact security of a given society is to a high degree determined by the amount of information technology on ground. Thus it might interest one the to know that security are of differing contexts. An information system for a bankers dealing via an automatic teller machine differs from a network based information system for collecting, collating and analyzing statistical data for management use. There is also a system of inbuilt detectors in doors on entries to check explosives and metals.There is also a camera system on focus connected to a visual display unit for monitoring activities especially in banking halls and supermarkets. Hence information technology has a vital role to play in the task of ensuring maximum security. This work is based on an network based information system for collecting and collating as well as analyzing crime for the use of management at all levels of an organization in their task of decision taking, plannin g and control strategies based on security. CHAPTER THREE . DESCRIPTION OF THE EXISTING SYSTEM The existing system has been an almost manually operated system due to lack of sophisticated data processing machines that will by its efficiency replace the much engaged manual system in crime data analysis. The B’OPS COMMUNICATION of the Nigerian Police, Enugu State Branch, which is my case study organisation is changed with the responsibility of information management, processing and analysis. They are fond of information dissemination and collection of crime data.This crime information is being communicated to the police Administrations at all levels in all functions to enable them in their timely decision taking about the security of their jurisdictions for which they are responsible. EQUIPMENT:Irrespective of the lack of modern machines like computers, the B’OPS COMMUNITCATION SHQ ENUGU operates with some equipments and gates which includes -carrier wave radio sets (use d in receiving wireless telegraphy information). -Walkie talkies (used for timely interaction with men on duty). -Fax machines (for receiving documented information) Repeater set (enhances the reception of Transmitted messages) -Repeater station (enhances the signal strength of information at various stations) -Stand by Generator (used in cases of power failure) -Integration systems (for connecting different communication networks) FORMS:The organization makes use of three traditional forms for differing purpose. The form include the following: -Message form B1- Used for the reception and transmission of information. This is done manually by writing or talking with the recipient on the set. Signal register form B2 – This is the form used to register the particulars of all information received such that an observer can at one glance read the information. -Wireless operators LDG form B3 – This is a form used to write down events that took place at course of operation suc h as power outrage, atmospheric interference, Rainfall, thunders storm, generator braked down etc. that might interfere in operation. NATURE OF INFORMATION: B’OPS COMMUNICATION offices are situated at all police stations and jurisdictions with a divisional control link as data base management in SHQ Enugu known to them as control.The divisions are expected to constantly collect crime data around their jurisdiction and transmit some individually to the control who forms a statistical update of the information should be based on weekly, monthly and fairly bases as demanded by the administrators for security actions. 3. 1FACT FINDING METHOD The fact finding methods here can be classified into internal and external sources of data collection. -The internal source: This involves the use of information as recorded in the crime diary at police stations under different headings according to the crime distinctions within the specified period under investigation.Another source of inter nal information is the signal register-form B2. -The external source: This involves the use information facilities (like the Walkill talkie) to communicate the law enforcement officers in the society (on enforcement officers in the society (on operation). They mostly in this case communicate on events that need immediate intervention. Due to the fact that these events are legged down at each interval, the wireless operators log-form B3 is used as a medium whereby crime data can be collected. 2. ORGANISATIONAL STRUCTURE The Nigerian police force is an organization known to exhibit hierarchy.For the above reason the B’OPS COMMUNICATION also fellow’s suit. The information flow is in a vertical dimension though there is horizontal flow at the operational levels. Information flow chart 3. THE INPUT, OUTPUT AND THE PROCESSING SYSTEM The process of executing this daily task of information dissemination and analysis though has some tools of automation is still lacking the basi c information technology (computer system) that will reduce or eliminate the much engaged manual system. The input method, which involves much writing, the processing which is also manual has to be automated. Examine the analysis in the diagram Below: . PROBLEMS OF THE EXISTING SYSTEM There has not been enough information technology that will replace the much-engaged manual effort such as in the input and processing systems. There is no dependable storage system for information. Infor-tech facilities that can be used to store information and retrieve them when needed is necessary to be introduced in other to achieve the needed security of information. The process of dispatching the received information in the B’OPS COMMUNICATION, POLICE SHQ, ENUGU is purely manual thus this amounts to delay of information especially in cases of emergency.There is need to put adequate information technology in place to enhance the dispatch of this needed information and as well reduce human en gagement in this task. Mist of the wireless operators managing this information network are not properly trained especially in the area of operating modern information technology, therefore there is the need that expend in information management be trained properly in handling these modern tools. Barely all the form’s used in the existing system are traditional, there is the need to introduce the use of imaged form to enhance security of information and automation. . JUSTIFICATION OF THE NEW SYSTEM The new system to be introduced in this work will eliminate or reduce the much engaged manual effort, introduce the use of experts is the use of information technology, replace the use of old fashioned tools on use with modern information technology tools and crown it all the system will achieve. 1. Data security 2. Handling of files for easy assessment 3. Reduce of eliminate error of computation 4. Speedy collection of information for security analysis 5. Prompt supply of informat ion for use in timely decision taking hby the managers 6.Information storage for subsequent use. 7. Easy dispatch system 8. Forecast for security planning. CHAPTER FOUR 4. DESIGN OF THE NETWORK BASED SECURITY INFORMATION SYSTEM. SYSTEM DESIGN AND DEVELOPMENT The whole system involves the application of the system approach to problem solving with computers. The ingredients and materials are system elements, processes and information technology network. It is actually a customized approach to the use of computers for data analysis, automation and information management.This is reduction of the entire system by studying the various operations performed and their relationships within the system and examination of a business activity with a view to identifying problem areas and recommending alternative solutions. Also, for security of critical facts and restrictions, the system operation can best be operated in an INTRANET environment. 4. 1METHODS OF DATA COLLECTION The fact-finding meth od here should be a situation whereby the information technology is engaged (ie computer), such that data can be Rayed in directly into the system. The forms in this case should be imaged forms and not usual traditional forms.The aggregate data collected and stored can and the different programs of computer. The network system is aimed at establishing information links between the various angles. 2. SYSTEM DESIGN Having studied and analyzed the manual processing operated by the B’ OPS CMMUNICATION of the Enugu State Police and the way it has been done; the proposed system design therefore enables one to achieve efficiency and effectiveness. In the system design, care is taken in the planning system very close to the manually processed method, but with serious optimization and automation.The proposed system is a computer based expert system. The system shall make use of expertise that has been gathered from skilled human resources about data management and information processi ng. All the work in the system will at the and achieve: Data security Handling of files or from. (the whole problem of missing file and statistics will be eliminated among the security circle). Reduce or Elimination the problems of computational error. Speedy collection of information Storage of information for subsequent or timely usage.Generally, the proposed system will help in the input, processing and output of information coupled with the storage which will be too cumbersome for individuals to handle in the manual system. During the process various crime facts will be collected within Enugu State as a jurisdiction under study. The data collected can be reported on daily, weekly , monthly or fairly bases as the case may be. The major crimes that were analyzed include: Armed robbery, murder, Burglary, House breaking, stealing, Kidnapping, child stealing, Arson, Rape and miscellaneous offence.The data collected will be arranged in a form to distinguish adult from juvenile crime s tatistics. 1. INPUT This system designed will create a situation where data will be keyed in directly into the computer the keyboard for immediate processing or storage. This expected to be carried out by a skilled expert in information technology management. 2. PROCESSING In this system the processing of data in order to achieve a pre-defined goal (information) is carried out electronically through some define instructions at a very fast pace (rate) with information technology tools (computes) which help; to improve efficiency and automation. . OUTPUT After actual processing is over the required information or output is generated and accessed by the user for importance. Thus an information is never confirmed until it is able to meet the need of the management which includes urgency, confidentiality and decision taking about the activities (here security) for which the activities are responsible. 4. INFORMATION STORAGE AND RETRIEVAL The computer network system have the advantage of providing a suitable information storage and retrieval system requiring data to be structured, tored and retrieved in a memory that suits the kind of data and information needs of the users at all the levels. CHAPTER FIVE IMPLEMENTATION OF THE NEW SYSTEM CHOICE OF PROGRAMMEING LANGUAGE Among the existing high level and low-level programming languages, I choose QBASIC programming language considering a lot of factors and features in the structure of my work. First, I observed that QBASIC consist of features that will help the writer achieve the logistic needs of the project work in terms of access methods such as the RANDOM ACCESS of some parts of the work and the SEQUENTIAL ACCESS of some other parts of the programs.CHAPTER SIX OUTPUT INTERPRETATION This program is purely more of an interactive system. It consists of the main program which houses a lot of subprograms of several analysis. Before the min menu, is a software restriction called PASSWORD which must be obeyed before acces s to the main menu form the main menu is provided multiple options of the sub menus which now ask a series of question as the case may b. in the main menu, there are four sub-menus of four major modules, THE RECORD INPUT MODULE, FILE MAINTENANCE MODULE, REPORT GENERATION MODULES AND GRAPHICAL PRESENTATION MODULE THEN THE EXIT.The REPORT GENERATION module comprises of five sub menu called monthly reports and monthly statistics, annual report, annual statistics from the entire jurisdiction and a forecast report. This module gives the monthly and annual state of crimes from the various divisions for use. The forecast report is projected as a result of the report generation. The FILE MAINTENANCE module takes care of the necessary treatment and enhancement of the files in the program. It houses a lot of submenus for the operation. Also, in the program a provision and/or module is created to check and access the present state of the work.CONCLUSION This work is carefully researched and pr epared for the citizens who are interested in the general security picture of Enugu State, Nigeria. The volume trend and rate of crime related to current population is quite amazing. The crime index offence are grouped into three major categories and were extensively discussed to better describe the nature of these security threats. The objective of this work is achieved when managements at all levels and polices administrations can use the reports generated (information) in decision taking about the security situation of the state.An example of the use of crime statistics the baring of the high capacity motorcycle use within Enugu state in early 2004, this is following the high rate of Armed robbery perpetrated with such high capacity bikes. The work will also help to forecast the nature, trend and distribution of crime wave in the state thereby enabling the people concerned to reinforce for the combat. CHAPTER SEVEN RECOMMENDATION Based on the findings and relevance of this work t o the society. I simply and concisely made drawing from my own exceptional experience and the information obtained from the B’ OPS COMMUNICATION of Enugu State Police during the system study.The fruit and importance of this work is not valid for members of police force or the Administrations, but will prove to be a source of information and guidance to researchers with scientific or legal aspects of the foresenic work. The state B’ OPS COMMUNICATION should try to be computerized so that all their facts and data collection should be network based for adequate interactions, efficiency and stability. PROGRAM FLOWCHART OF CRIME RECORD SYSTEM PROGRAMMING Cls Finish $ = â€Å"N† Do while finish $ =†N† For J = 1 To 24 Locate J, I For I = 1 To 80 Print CHR $ (178): Next I Next J R = S : C = 20 For I = 1 To 31 Print CHR $ (219) Next IFor I = 0 To 8 Locate R + I, C-I : Print CHR $ (219) Locate R + I, C + 31: Print CHR $ (219) Next I Locate R + 1, C: Print â₠¬Å"***† Locate R + 3, C: Print â€Å"1, Record Input ***† Locate R + 4, C: Print â€Å"2, File Maintenance ***† Locate R + 5, C: Print â€Å"3, Report Generation & Printing† Locate R + 6, C: Print â€Å"4, Statistical Presentation† Locate R + 7, C: Print â€Å"5, Exit † Mychoice = 0 Do while mychoice < 1 or Mychoice > 5 Locate R + 10, C: Input â€Å"Your Choice Please (1-5):†, Mychoice Loop Select Crime Mychoice Crime 1 Call Recinput Crime 2 Call Filemain Crime 3 Call Reportgn Crime 5 Finish $ = â€Å"EN† End selectLoop Locate J, I For I = 1 To 80 Print CHR $ (178); Next I Next J R = 5 : C = 20 Locate R,C For I = 1 To 31 Print CHR $ (219); Next I For I = 0 To 10 Locate R + I, C-I : Print CHR $ (219); Locate R + I, C + 31: Print CHR $ (219) Next I Locate R + 1, C: Print â€Å"*Report Generation*† Locate R + 3, C: Print â€Å"1, Generate Monthly Report† Locate R + 4, C: Print â€Å"2, Generate Annual Report† L ocate R + 5, C: Print â€Å"3, Generate forecast Report† Locate R + 6, C: Print â€Å"4, Print Monthly Report† Locate R + 7, C: Print â€Å"5. Print Annual Report† Locate R + 8, C: Print â€Å"6. Print Forecast Report† Locate R + 9, C: Print â€Å"7. Exit †The Choice = 0 Do while the choice < 1 or the choice > 7 Locate R + 10, C: Input â€Å"Your Choice Please (1-7)†, the choice Loop Select Crime the choice Crime 1 Call Monthsta Crime 2 Call Annualst Crime 3 Call Forecast Crime 4 Call MonthRpt Crime 6 Call Forecarp Crime 7 Finished $ = â€Å"EN† End select Loop End Sub Sub Annual RP ‘Annual RP. BAS ‘ Annual Statistics Printing Program Dum M $ (28) Cls Open â€Å"I†, $ 1, â€Å"Annualst. FIL† Input $ 1, EN$ Close $ 1 Do Locate 10, 10: Input â€Å"Output To Screen or Printer (P or S):†;K$ K$ = U Crime$ (K$) Loop Until K$ = â€Å"P† or K$ = â€Å"S† Cls Open â€Å"I†, $ 1, â€Å"Annu alst. FIL† If K$ = â€Å"S† ThenPrint â€Å"B† OPS Police Communication† Print â€Å"Annual Crime Statistics Report† Print: Print â€Å"For The Year;†: EN$ Locate 5, 1 : Print â€Å"SN† Locate 5, 3 : Print â€Å"Offences† Locate 5, 32 : Print â€Å"Jan† Locate 5, 44 : Print â€Å"Feb† Locate 5, 56 : Print â€Å"Mar† Locate 5, 68 : Print â€Å"Apr† Locate 6, 30 : Print â€Å"M† Locate 6, 36 : Print â€Å"F† Locate 6, 42 : Print â€Å"M† Locate 6, 48 : Print â€Å"F† Locate 6, 54 : Print â€Å"M† Locate 6, 60 : Print â€Å"F† Locate 6, 66 : Print â€Å"M† Locate 6, 72 : Print â€Å"F† R = 7 : I = 1 Do while not EOF (I) Input N1, EN$, C$, F$, M1, M2, M3, M4, M5, M6 Input N1, M7, M8, M9, M10, M11, M12, M13, M14 Input #1, M15, M16, M17, M18, M19, M20, M21, M22Input #1, M23, M24, T Locate (R 8 + I), 1: Print C$ : Locate (R 8 + I), 3: Print F$ Locate (R 8 + I), 30 : Print M1 : Locate (R 8 + I), 36 : Print M2 Locate (R 8 + I), 42 : Print M3 : Locate (R 8 + I), 48 : Print M4 Locate (R 8 + I), 54 : Print M5 : Locate (R 8 + I), 60 : Print M6 Locate (R 8 + I), 66 : Print M7 : Locate (R 8 + I), 72 : Print M8 I = I + 1 Loop Close #1 Call Get Key Locate 5, 32 : Print â€Å"May† Locate 5, 44 : Print â€Å"Jun† Locate 5, 56 : Print â€Å"Jul† Locate 5, 68 : Print â€Å"Aug† R8 = 7 : I = 1 OPEN â€Å"I†, #1, â€Å"ANNUALST . FIL† Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5, M6, M7Input #1, M8, M9, M10, M11, M12, M13, M14, M15, M16, M17 Input #1, M18, M19, M20, M21, M22, M23, M24, T Locate (R 8 + I), 30 : Print M9 : Locate (R 8 + I) 36 : Print M10 Locate (R 8 + I), 42 : Print M11 : Locate (R 8 + I), 48 : Print M12 Locate (R 8 + I), 54 : Print M13 : Locate (R 8 + I) 60 : Print M14 Locate (R 8 + I), 66 : Print M15 : Locate (R 8 + I) 72 : Print M16 I = J + 1 Loop Close #1 Call Get Key L ocate 5, 32 : Print â€Å"Sep† Locate 5, 44 : Print â€Å"Oct† Locate 5, 56 : Print â€Å"Nov† Locate 5, 68 : Print â€Å"Dec† R8 = 7 : I = 1 OPEN â€Å"I†, #1, â€Å"ANNUALST . FIL† Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5, M6Input #1, M7,M8, M9, M10, M11, M12, M13, M14, M15 Input #1, M16, M17, M18, M19, M20, M21, M22, M23, Input #1, M24, T I = I + 1 Loop Close #1 Call Get Key Locate 5, 30 : Print â€Å"Total† R8 = 7 : I = 1 OPEN â€Å"I†, #1, â€Å"ANNUALST . FIL† Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5 Input #1, M6, M7,M8, M9, M10, M11, M12, M13 Input #1, M14, M15, M16, M17, M18, M19, M20, M21 Input #1, M22, M23, M24, T Locate (R8 + I), 30 : Print T I = I + 1 Loop Close # 1 CALL GETKEY ELSE L Print â€Å"B’ OPS Police Communication† L Print â€Å"Annual Crime Statistics Report† L Print : L Print â€Å"For Each Division† EN$ L PrintL Print â€Å" SN† : Tab (3); â€Å"Offences†; Tab(31); â€Å"Jan†; Tab (39); â€Å"Feb† L Print Tab (47); â€Å"Mar†; Tab (55); â€Å"Apr†; Tab (63); â€Å"May†; L Print Tab (71); â€Å"Jun†; Tab (79); â€Å"Jul†; Tab (87); â€Å"Aug†; L Print Tab (95); â€Å"Sep† ; Tab (103); â€Å"Oct†; Tab (111); â€Å"Nov†; L Print Tab (119); â€Å"Dec†; Tab (127); â€Å"Total† Col 8 = 26 For I = 1 To 12 Col 8 = Col 8 + 4 L Print Tab (Col 8); â€Å"M†; Col 8 = Col 8 + 4 L Print Tab (Col 8); â€Å"F†; Next I Do While Not EOF (1) Cls OPEN â€Å"I†, #1, â€Å"ANNUALST. FIL† Input #1, Y$ YY$ = STR$ (Val (Y$) + 1) OPEN â€Å"O†, #2, â€Å"FORECAST. FIL† OPEN â€Å"I†, #1, â€Å"ANNUALST. FIL† Do While Not EOF (1) Input #1, Y$, C$, F4, M(1), F(1), M(2), F(2), M(3), F(3)Input #1, M4, F(4), M5, F(5), M6, F(6), M7, F(7) Input #1, M(8), F(8), M(9), F(9), M(10), F(10), M(11), Input #1, M(12), F(12), Total My = O : SM2 = 0 : Sm3 =0: Sm4 = 0: Smy = 0: M2y = 0 Fy = O : Sf = 0 Sf2 = : Sf3 = 0: SF4 = : Sfy = 0 : F2y = 0 For I = 1 To 12 Sm = Sm + I : Sf = Sf + 1 My = My + m (I) : Fy = Fy + F (I) Sm2 = Sm2 + I ^ 2 : Sf2 = Sf2 + I ^ 2 Sm3 = Sm3 + I ^ 3 : Sf3 = Sf3 + I ^ 3 Sm4 = Sm4 + I ^ 4 : Sf4 = Sf4 + I ^ 4 Smy = Smy + I * m (I) : Sfy + I * F (I) M2y = M2y + I ^ 2 * M(I) : F2y = F2y + I ^ 2 * F (I) Next I ‘ Store Values For Males In The A – Array Ready ‘ For Gaussian EliminationA (1, 1) = 12 : A (1, 2) = Sm2 : A (1, 23) = Sm2 : B (1) = My A (2, 1) = Sm : A (2, 2) = Sm2 : A (2, 3) = Sm3 : B(2) = Smy A(3, 1) = Sm2 : A (3, 2) = Sm3 : A (3, 3) = Sm4 : B(3) = M2y Call Gauss (x1, x2, X3) ‘ Estimate the figures for males for the ‘next three months Fm1 = X1, + X2 * 13 + X3 * 13 ^ 2 Fm2 = X1 + X2 * 14 + X3 * 14 ^ 2 Fm3 = X1 + X2 * 15 + X3 * 15 ^ 2 ‘Store values for females in the A? Array ‘Ready for gaussian elim ination A (1, 1) = 12 : A(1, 2) = Sf : AC1, 3) = Sf2 : B(1) = Fy A(2,1 ) = Sf : A (2, 2) = Sf2 : A (2, 3) = Sf3 : B (2) = Sfy A (3, 1) = Sf2 : A (3, 2) = Sf3 : A (3, 3) = Sf4 : B(3) = F2y Call Guass (x1, X2, x3) Estimate the figures for females for the next ‘Three months Ff1 = x1 + x2 * 13 + x3 * 13 ^ 2 Ff2 = x1 + x2 * 14 + x3 * 14 ^ 2 Ff3 = x1 + x2 * 15 + x3 * 15 ^ 2 Print # 2, YY$, â€Å" † ; C$; â€Å" †; F$; â€Å" †; Fm1; â€Å" †; FF1 Print # 2, Fm2; FF2 T Loop Close # 1 End Sub Sub Forecarp ‘Forecarp . Bas ‘Forecast Figure Printing Program Dm M$ (9) Cls Open â€Å"1† , # 1, â€Å"Forecast . Fil† `Input # 1, YY$ Close #1 Do Locate 10, 10 : Input â€Å"Output to Screen (P or S) : â€Å" ; K$ K$ = U Crime $ (K$) Loop Until K$ = â€Å"P† Or K$ = â€Å"S† Cls Open â€Å"1† , #1, â€Å"Forecast. Fill† If K$ = ‘S† Then Print â€Å"B’ OPS Police Communication† Print : P rint â€Å"For The Year : YY$Locate 5, 1 : Print â€Å"SN† Locate 5, 3 : Print â€Å"Offences† Locate 5, 32 : Print â€Å" Jan† Locate 5, 44 : Print â€Å" Feb† Locate 5, 56 : Print â€Å"Mar† Locate 6, 30 : Print â€Å"M† Locate 6, 36 : Print â€Å"F† Locate 6, 42 : Print â€Å"M† Locate 6, 48 : Print â€Å"F† Locate 6, 54 : Print â€Å"M† Locate 6, 60 : Print â€Å"F† R8 = 7 : I = 1 Do while not EOF (1) Input #1, YY$, C$, F$, M1, M2, M3, M4, M5, M6 Locate (R8 + I), 1 : Print C$ : Locate (R8 + I), 3 : Print F$ Locate (R8 + I), 30 : Print M1 : Locate (R8 + I) 36 : Print M2 Locate (R8 + I), 42 : Print M3 : Locate (R8 + I) 48 : Print M4 Locate (R8 + I), 54 : Print M5 : Locate (R8 + I) 60 : Print M6 I = I + 1Loop Close #1 Else L PRINT â€Å"B’ OPS POLICE COMMUNICATION† L Print : LPrint â€Å"For the Year : â€Å"; YY$ Lprint Lprint â€Å"SN†; TAB(3); â€Å"Oddwnxwa†; Tab(31); â⠂¬Å"Jan†; Tab(39); â€Å"Feb† Lprint Tab (47); â€Å"Mar† Col 8 = 26 For I = 1 To 3 Col 8 = Col 8 + 4 Lprint Tab (Col 8); â€Å"M†; Col 8 = Col 8 + 4 Lprint Tab (Col 8); â€Å"F†; Next I Do While Not EOF (1) For I = 1 To 9 Input #1, M$ (I) Next I Lprint M$ (2); Tab(3); M$(3); Col 8 = 26 Total = 0 For I = 4 To 8 Step 2 Col 8 = Col 8 + 4 LPrint Tab (Col 8); M$ (I + 1); Total = Total + Val (M$ (I)) + Val (M$ (I + 1)) Next I L Print Tab (60) : Total Loop End ifClose #1 YY$ = Input $ (1) End Sub SUB GET KEY Locate 24, 10 : Print â€Å"Press Any Key To Continue† Do A$ = INKEY$ Loop Until A$ < > â€Å" † END SUB ———————– FORCE COMMUNICATION STATE COMMUNICATION DIVISIONAL COMMUNICATION Cls Screen 9,0,0 color 3 Finish $ = â€Å"N† Dowhile finish $ = â€Å"N† For J = 1 To 24 Locate J, 1 For I = 1 To 80 Print Chr $ (178) Next I: Next J Locate R + 1, C:? â€Å"Main Menu† Locate R + 2, C:? â€Å"1. Record Input† Locate R + 3, C:? â€Å"2. File Maintenance† Locate R + 4, C:? â€Å"3. Report generation and Printing† Locate R + 5, C:? â€Å"4. Statistical Presentation†Locate R + 6, C:? â€Å"5. Exit† MYCHOICE = 0 DO WHILE MYCHOICE < 1 OR MYCHOICE > 5 LOCATE R + 10, C:INPUT â€Å"YOUR CHOICE PLEASE (1-5):† MYCHOICE LOOP IF SELECT CRIME MYCHOICE CRIME 1 CRIME 2 CRIME 3 CRIME 4 CRIME 5 Finish $ = â€Å"Y† End selected Locate 24, 10 Print â€Å"Press Any key To† â€Å"Continue† Do A $ = In keys Loop until A$ â€Å" â€Å" END SUB EXIT CRIME 1 SUB REC INPUT ASSIGNMENT BOX IF PRINT = â€Å"KEY† â€Å"Murder† â€Å"Suicide† â€Å"Wounding† â€Å"Assault† â€Å"Kidnapping† â€Å"Rape† â€Å"Armed Robbery† â€Å"Stealing† â€Å"Burglary† â€Å"Arson† â€Å"Narcotics† â€Å"Traffic Offeence† House Breaking â €Å"Store Breaking† Miscellaneous† STOP CRIME2 SUB FILEMAIN ASSIGNMENT BOX IF MAIN = â€Å"y† DISPLAY RECORD DELETE RECORD REMOVE DELETE RECORD EDIT RECORD EDIT RECORD EXIT STOP CRIME 3 SUB REPORT GN ASSIGNMENT BOX IF MAIN T$ = â€Å"y† Generate Monthly Report EXIT Generate Annual Report Generate Fore Cast Report Print Monthly Report Print Annual Report Print Annual Report IF EN =3 FEB MAR APR MAY JUN JUL CRIME 4 SUB ANNUALST INPUT â€Å"DIV†; EN IF EN =2 IF EN =1 JAN JAN FEB FEB MAR MART APR APR MAY MAY JUN JUN JUL JUL AUG AUG AUG SEP SEP SEP JAN STOP OCT OCT OCT NOV NOV NOV DEC DEC DEC STOP STOP